Lucjan Hanzlik
Orcid: 0009-0006-1941-693XAffiliations:
- CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
- Stanford University, USA
According to our database1,
Lucjan Hanzlik
authored at least 63 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Financial Cryptography and Data Security, 2022
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021
Proceedings of the Security of Ubiquitous Computing Systems, 2021
2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019
Fundam. Informaticae, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
IACR Cryptol. ePrint Arch., 2018
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017
2016
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups".
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Computations on Private Sets and their Application to Biometric based Authentication Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
J. Univers. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users.
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
Int. J. Netw. Secur., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012