Post-quantum zero-knowledge and signatures from symmetric-key primitives M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ... 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 …, 2017 | 362 | 2017 |
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based D Derler, K Samelin, D Slamanig, C Striecks Network and Distributed System Security Symposium 2019 (NDSS'19), 2019 | 168 | 2019 |
Chameleon-Hashes with Ephemeral Trapdoors J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig IACR International Conference on Practice and Theory of Public-Key …, 2017 | 163* | 2017 |
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials G Fuchsbauer, C Hanser, D Slamanig Journal of Cryptology 32 (2), 498-546, 2019 | 162* | 2019 |
The Picnic Signature Scheme M Chase, D Derler, S Goldfeder, J Katz, V Kolesnikov, C Orlandi, ... Submission to NIST Post-Quantum Cryptography project, 2019 | 131* | 2019 |
Revisiting cryptographic accumulators, additional properties and relations to other primitives D Derler, C Hanser, D Slamanig Cryptographers’ Track at the RSA Conference, 127-144, 2015 | 126 | 2015 |
Structure-preserving signatures on equivalence classes and their application to anonymous credentials C Hanser, D Slamanig Advances in Cryptology - ASIACRYPT 2014, 491-511, 2014 | 100 | 2014 |
Practical round-optimal blind signatures in the standard model G Fuchsbauer, C Hanser, D Slamanig Advances in Cryptology - CRYPTO 2015, 233-253, 2015 | 98 | 2015 |
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange D Derler, K Gellert, T Jager, D Slamanig, C Striecks Journal of Cryptology 34 (2), 1-59, 2021 | 94 | 2021 |
Privacy aspects of ehealth D Slamanig, C Stingl Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008 | 92 | 2008 |
On cloud storage and the cloud of clouds approach D Slamanig, C Hanser Internet Technology And Secured Transactions, 2012 International Conference …, 2012 | 78 | 2012 |
Highly-efficient fully-anonymous dynamic group signatures D Derler, D Slamanig 2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS …, 2018 | 70* | 2018 |
A general framework for redactable signatures and new constructions D Derler, HC Pöhls, K Samelin, D Slamanig International Conference on Information Security and Cryptology, 3-19, 2015 | 61 | 2015 |
A framework for privacy-preserving mobile payment on security enhanced arm trustzone platforms M Pirker, D Slamanig Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012 | 61 | 2012 |
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives D Derler, S Ramacher, D Slamanig International Conference on Post-Quantum Cryptography, 419-440, 2018 | 60 | 2018 |
Revisiting proxy re-encryption: Forward secrecy, improved security, and applications D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks IACR International Conference on Practice and Theory of Public-Key …, 2018 | 59* | 2018 |
ARCHISTAR: towards secure and robust cloud based data sharing T Loruenser, A Happe, D Slamanig Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th …, 2015 | 53 | 2015 |
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically B Abdolmaleki, S Ramacher, D Slamanig 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, 2020 | 48 | 2020 |
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge D Derler, D Slamanig Designs, Codes and Cryptography 87, 1373-1413, 2019 | 48* | 2019 |
Cryptography for security and privacy in cloud computing S Rass, D Slamanig Artech House, 2013 | 48* | 2013 |