Random oracles in a quantum world D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 541 | 2011 |
Distributed single sign-on J Camenisch, Y Gilad, A Lehmann, G Neven US Patent 9,705,872, 2017 | 182 | 2017 |
Security of sanitizable signatures revisited C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ... Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009 | 177 | 2009 |
Anonymous attestation using the strong diffie hellman assumption revisited J Camenisch, M Drijvers, A Lehmann Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016 | 132 | 2016 |
Unlinkability of sanitizable signatures C Brzuska, M Fischlin, A Lehmann, D Schröder Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 118 | 2010 |
Random oracles with (out) programmability M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro International Conference on the Theory and Application of Cryptology and …, 2010 | 103 | 2010 |
The wonderful world of global random oracles J Camenisch, M Drijvers, T Gagliardoni, A Lehmann, G Neven Annual International Conference on the Theory and Applications of …, 2018 | 100 | 2018 |
Updatable encryption with post-compromise security A Lehmann, B Tackmann Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 89 | 2018 |
Universally composable direct anonymous attestation J Camenisch, M Drijvers, A Lehmann Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 89 | 2016 |
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian 2017 IEEE Symposium on Security and Privacy (SP), 901-920, 2017 | 76 | 2017 |
On the joint security of encryption and signature in EMV JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 75 | 2012 |
Optimal distributed password verification J Camenisch, A Lehmann, G Neven Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 73 | 2015 |
Formal treatment of privacy-enhancing credential systems J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ... International Conference on Selected Areas in Cryptography, 3-24, 2015 | 69 | 2015 |
Concepts and languages for privacy-preserving attribute-based authentication J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ... Policies and Research in Identity Management: Third IFIP WG 11.6 Working …, 2013 | 66 | 2013 |
Memento: How to reconstruct your secrets from a single password in a hostile environment J Camenisch, A Lehmann, A Lysyanskaya, G Neven Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 64 | 2014 |
Short threshold dynamic group signatures J Camenisch, M Drijvers, A Lehmann, G Neven, P Towa International conference on security and cryptography for networks, 401-423, 2020 | 56 | 2020 |
(R)CCA Secure Updatable Encryption with Integrity Protection M Klooß, A Lehmann, A Rupp Eurocrypt, 2019 | 55 | 2019 |
History-free aggregate message authentication codes O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ... Security and Cryptography for Networks: 7th International Conference, SCN …, 2010 | 53 | 2010 |
D2. 1 architecture for attribute-based credential technologies J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ... Deliverable, ABC4Trust EU Project, 2011 | 44 | 2011 |
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020 | 43 | 2020 |