Serge Fehr
According to our database1,
Serge Fehr
authored at least 74 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
J. Cryptol., October, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
The Fiat-Shamir Transformation of (Γ<sub>1,đots,Γ<sub>μ)</sub></sub>-Special-Sound Interactive Proofs.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
2022
New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment.
J. Medical Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF.
IACR Cryptol. ePrint Arch., 2022
Parallel Repetition of (k<sub>1, đots</sub> , k<sub>μ </sub>)-Special-Sound Multi-round Interactive Proofs.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Parallel Repetition of (k<sub>1, đots, k<sub>μ</sub>)</sub>-Special-Sound Multi-Round Interactive Proofs.
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.
IACR Cryptol. ePrint Arch., 2020
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Advances in Information and Computer Security, 2020
2019
Robust Secret Sharing with Optimal Share Size and Security Against Rushing Adversaries.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation.
IACR Cryptol. ePrint Arch., 2018
ERCIM News, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely & Feasibly.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
2016
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Theoretic Security - 9th International Conference, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
IACR Cryptol. ePrint Arch., 2015
2014
Theor. Comput. Sci., 2014
SIAM J. Comput., 2014
Proceedings of the 9th Conference on the Theory of Quantum Computation, 2014
2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
2012
An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification.
Proceedings of the Theory of Quantum Computation, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
The Garden-Hose Game: A New Model of Computation, and Application to Position-Based Quantum Cryptography
CoRR, 2011
2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2008
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles.
IACR Cryptol. ePrint Arch., 2008
Randomness Extraction Via <i>delta</i> -Biased Masking in the Presence of a Quantum Attacker.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
2007
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
2006
2005
Proceedings of the Advances in Cryptology, 2005
2004
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Advances in Cryptology, 2004
2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Advances in Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Advances in Cryptology, 2001