Stephan Krenn
Orcid: 0000-0003-2835-9093
According to our database1,
Stephan Krenn
authored at least 74 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Comput. Secur., January, 2024
Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications.
IACR Cryptol. ePrint Arch., 2024
Protecting Privacy in Federated Time Series Analysis: A Pragmatic Technology Review for Application Developers.
CoRR, 2024
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques.
Comput. Networks, 2024
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Entropy, February, 2023
ERCIM News, 2023
RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
A Verifiable Multiparty Computation Solver for the Assignment Problem and Applications to Air Traffic Management.
CoRR, 2022
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022
A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 1st International Workshop on Data Economy, 2022
A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022
KRAKEN: A Secure, Trusted, Regulatory-Compliant, and Privacy-Preserving Data Sharing Platform.
Proceedings of the Data Spaces - Design, 2022
2021
Privacy-Preserving Identity Management and Applications to Academic Degree Verification.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications.
IACR Cryptol. ePrint Arch., 2018
2017
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
IACR Cryptol. ePrint Arch., 2016
Comput. Complex., 2016
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the Security Protocols XXIV, 2016
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings.
IACR Cryptol. ePrint Arch., 2014
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
2012
Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
IACR Cryptol. ePrint Arch., 2008