Implementing RLWE-based Schemes Using an RSA Co-Processor.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials.
J. Cryptol., 2019
Learning with Errors on RSA Co-Processors.
IACR Cryptol. ePrint Arch., 2018
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2016
Practical Round-Optimal Blind Signatures in the Standard Model.
IACR Cryptol. ePrint Arch., 2015
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives.
IACR Cryptol. ePrint Arch., 2015
Towards Authenticity and Privacy Preserving Accountable Workflows.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015
A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Verifiably Encrypted Signatures: Security Revisited and a New Construction.
Proceedings of the Computer Security - ESORICS 2015, 2015
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes.
IACR Cryptol. ePrint Arch., 2014
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2014
Blank Digital Signatures: Optimization and Practical Experiences.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2013
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013
Blank Digital Signatures.
IACR Cryptol. ePrint Arch., 2013
Group Signatures on Mobile Devices: Practical Experiences.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
On cloud storage and the cloud of clouds approach.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012