Christian Schaffner

Orcid: 0000-0002-1754-1415

According to our database1, Christian Schaffner authored at least 48 papers between 2005 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.
IACR Cryptol. ePrint Arch., 2022

Optimal Design of Time-of-Use Tariffs using Bilevel Optimization.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2022

2021
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding.
IACR Cryptol. ePrint Arch., 2021

Online-Extractability in the Quantum Random-Oracle Model.
IACR Cryptol. ePrint Arch., 2021

A Guide for New Program Committee Members at Theoretical Computer Science Conferences.
CoRR, 2021

Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2019
Non-malleability for quantum public-key encryption.
IACR Cryptol. ePrint Arch., 2019

Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions.
IACR Cryptol. ePrint Arch., 2019

Secure Multi-party Quantum Computation with a Dishonest Majority.
IACR Cryptol. ePrint Arch., 2019

Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model.
IACR Cryptol. ePrint Arch., 2019

Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability.
IACR Cryptol. ePrint Arch., 2019

Quantum Indistinguishability of Random Sponges.
IACR Cryptol. ePrint Arch., 2019

2018
Quantum Homomorphic Encryption for Polynomial-Size Circuits.
Theory Comput., 2018

2017
Using Simon's algorithm to attack symmetric-key cryptographic primitives.
Quantum Inf. Comput., 2017

A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model.
IACR Cryptol. ePrint Arch., 2017

Post-quantum security of the sponge construction.
IACR Cryptol. ePrint Arch., 2017

Quantum Fully Homomorphic Encryption with Verification.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Quantum homomorphic encryption for polynomial-sized circuits.
IACR Cryptol. ePrint Arch., 2016

Computational Security of Quantum Encryption.
IACR Cryptol. ePrint Arch., 2016

Quantum cryptography beyond quantum key distribution.
Des. Codes Cryptogr., 2016

2015
Multiparty Zero-Error Classical Channel Coding With Entanglement.
IEEE Trans. Inf. Theory, 2015

Semantic Security and Indistinguishability in the Quantum World.
IACR Cryptol. ePrint Arch., 2015

Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography.
CoRR, 2015

2014
Secure identification and QKD in the bounded-quantum-storage model.
Theor. Comput. Sci., 2014

Position-Based Quantum Cryptography: Impossibility and Constructions.
SIAM J. Comput., 2014

On the Parallel Repetition of Multi-Player Games: The No-Signaling Case.
Proceedings of the 9th Conference on the Theory of Quantum Computation, 2014

2013
The garden-hose model.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation
CoRR, 2012

An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification.
Proceedings of the Theory of Quantum Computation, 2012

2011
Leftover Hashing Against Quantum Side Information.
IEEE Trans. Inf. Theory, 2011

Position-Based Quantum Cryptography.
ERCIM News, 2011

Security and Composability of Randomness Expansion from Bell Inequalities
CoRR, 2011

The Garden-Hose Game: A New Model of Computation, and Application to Position-Based Quantum Cryptography
CoRR, 2011

2010
Random Oracles in a Quantum World.
IACR Cryptol. ePrint Arch., 2010

Random Oracles in a Quantum World
CoRR, 2010

2009
The operational meaning of min- and max-entropy.
IEEE Trans. Inf. Theory, 2009

Robust cryptography in the noisy-quantum-storage model.
Quantum Inf. Comput., 2009

Composing Quantum Protocols in a Classical Environment.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Improving the Security of Quantum Protocols via Commit-and-Open.
Proceedings of the Advances in Cryptology, 2009

On the Power of Two-Party Quantum Cryptography.
Proceedings of the Advances in Cryptology, 2009

2008
Cryptography in the Bounded-Quantum-Storage Model.
SIAM J. Comput., 2008

Randomness Extraction Via <i>delta</i> -Biased Masking in the Presence of a Quantum Attacker.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

2007
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker.
IACR Cryptol. ePrint Arch., 2007

A Tight High-Order Entropic Quantum Uncertainty Relation With Applications.
IACR Cryptol. ePrint Arch., 2007

Cryptography from Noisy Photonic Storage
CoRR, 2007

Cryptography in the Bounded-Quantum-Storage Model
CoRR, 2007

2006
Information-Theoretic Conditions for Two-Party Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2006

2005
Oblivious Transfer and Linear Functions.
IACR Cryptol. ePrint Arch., 2005


  Loading...