Kristiyan Haralambiev

According to our database1, Kristiyan Haralambiev authored at least 19 papers between 2004 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Structure-Preserving Signatures and Commitments to Group Elements.
J. Cryptol., 2016

2015
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions.
IACR Cryptol. ePrint Arch., 2015

Composable and Modular Anonymous Credentials: Definitions and Practical Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2013
Double-trapdoor anonymous tags for traceable signatures.
Int. J. Inf. Sec., 2013

Policy-based Secure Deletion.
IACR Cryptol. ePrint Arch., 2013

2012
Efficient Structure-Preserving Signature Scheme from Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Group to Group Commitments Do Not Shrink.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

2011
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications.
PhD thesis, 2011

Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.
IACR Cryptol. ePrint Arch., 2011

HB<sup>N</sup>: An HB-like protocol secure against man-in-the-middle attacks.
IACR Cryptol. ePrint Arch., 2011

Non-interactive Confirmer Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Structure Preserving CCA Secure Encryption and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

Cryptography Against Continuous Memory Attacks.
IACR Cryptol. ePrint Arch., 2010

Efficient Public-Key Cryptography in the Presence of Key Leakage.
IACR Cryptol. ePrint Arch., 2010

Signing on Elements in Bilinear Groups for Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2010

Efficient Message Space Extension for Automorphic Signatures.
Proceedings of the Information Security - 13th International Conference, 2010

2004
Large Scale Experiments for Semantic Labeling of Noun Phrases in Raw Text.
Proceedings of the Fourth International Conference on Language Resources and Evaluation, 2004


  Loading...