default search action
Eike Kiltz
Person information
- affiliation: Ruhr University Bochum, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c94]Phillip Gajland, Jonas Janneck, Eike Kiltz:
Ring Signatures for Deniable AKEM: Gandalf's Fellowship. CRYPTO (1) 2024: 305-338 - [i77]Phillip Gajland, Jonas Janneck, Eike Kiltz:
Ring Signatures for Deniable AKEM: Gandalf's Fellowship. IACR Cryptol. ePrint Arch. 2024: 890 (2024) - [i76]Phillip Gajland, Jonas Janneck, Eike Kiltz:
A Closer Look at Falcon. IACR Cryptol. ePrint Arch. 2024: 1769 (2024) - 2023
- [c93]Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp:
The Pre-Shared Key Modes of HPKE. ASIACRYPT (6) 2023: 329-360 - [c92]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe:
Post-Quantum Multi-Recipient Public Key Encryption. CCS 2023: 1108-1122 - [c91]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV. CT-RSA 2023: 645-671 - [c90]Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh:
A Thorough Treatment of Highly-Efficient NTRU Instantiations. Public Key Cryptography (1) 2023: 65-94 - [c89]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. Public Key Cryptography (1) 2023: 406-435 - [c88]Dominik Hartmann, Eike Kiltz:
Limits in the Provable Security of ECDSA Signatures. TCC (4) 2023: 279-309 - [i75]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV. IACR Cryptol. ePrint Arch. 2023: 115 (2023) - [i74]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. IACR Cryptol. ePrint Arch. 2023: 186 (2023) - [i73]Dominik Hartmann, Eike Kiltz:
Limits in the Provable Security of ECDSA Signatures. IACR Cryptol. ePrint Arch. 2023: 914 (2023) - [i72]Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp:
The Pre-Shared Key Modes of HPKE. IACR Cryptol. ePrint Arch. 2023: 1480 (2023) - 2022
- [c87]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. ASIACRYPT (2) 2022: 36-66 - [c86]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk:
Server-Aided Continuous Group Key Agreement. CCS 2022: 69-82 - [c85]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. CRYPTO (2) 2022: 699-728 - [p2]Dennis Hofheinz, Eike Kiltz:
Scalable Cryptography. Algorithms for Big Data 2022: 169-178 - [e3]Eike Kiltz, Vinod Vaikuntanathan:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13747, Springer 2022, ISBN 978-3-031-22317-4 [contents] - [e2]Eike Kiltz, Vinod Vaikuntanathan:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13748, Springer 2022, ISBN 978-3-031-22364-8 [contents] - [e1]Eike Kiltz, Vinod Vaikuntanathan:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13749, Springer 2022, ISBN 978-3-031-22367-9 [contents] - [d3]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Version v3.0. Zenodo, 2022 [all versions] - [i71]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. IACR Cryptol. ePrint Arch. 2022: 770 (2022) - [i70]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe:
Post-Quantum Multi-Recipient Public Key Encryption. IACR Cryptol. ePrint Arch. 2022: 1046 (2022) - [i69]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. IACR Cryptol. ePrint Arch. 2022: 1230 (2022) - 2021
- [c84]Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler:
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing. CCS 2021: 2722-2737 - [c83]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. CRYPTO (4) 2021: 670-700 - [c82]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. EUROCRYPT (1) 2021: 87-116 - [c81]Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. EUROCRYPT (1) 2021: 117-146 - [c80]Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu:
On the Impossibility of Purely Algebraic Signatures. TCC (3) 2021: 317-349 - [d2]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Version v2.0. Zenodo, 2021 [all versions] - [i68]Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu:
On the Impossibility of Short Algebraic Signatures. IACR Cryptol. ePrint Arch. 2021: 738 (2021) - [i67]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. IACR Cryptol. ePrint Arch. 2021: 863 (2021) - [i66]Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler:
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing. IACR Cryptol. ePrint Arch. 2021: 1351 (2021) - [i65]Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh:
A Thorough Treatment of Highly-Efficient NTRU Instantiations. IACR Cryptol. ePrint Arch. 2021: 1352 (2021) - [i64]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk:
Server-Aided Continuous Group Key Agreement. IACR Cryptol. ePrint Arch. 2021: 1456 (2021) - 2020
- [c79]Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen:
Lattice-Based Blind Signatures, Revisited. CRYPTO (2) 2020: 500-529 - [c78]Benedikt Auerbach, Federico Giacon, Eike Kiltz:
Everybody's a Target: Scalability in Public-Key Encryption. EUROCRYPT (3) 2020: 475-506 - [c77]Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh:
Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Public Key Cryptography (2) 2020: 389-422 - [d1]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Version v1.0. Zenodo, 2020 [all versions] - [i63]Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen:
Lattice-Based Blind Signatures, Revisited. IACR Cryptol. ePrint Arch. 2020: 769 (2020) - [i62]Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. IACR Cryptol. ePrint Arch. 2020: 1279 (2020) - [i61]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. IACR Cryptol. ePrint Arch. 2020: 1499 (2020)
2010 – 2019
- 2019
- [j23]Benedikt Auerbach, Mary Shnayien, Eike Kiltz, Anna Tuschling:
Zwei Betrachtungen von Sicherheit und Privatheit nach Snowden. Datenschutz und Datensicherheit 43(11): 706-712 (2019) - [c76]Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. CT-RSA 2019: 230-250 - [c75]Eduard Hauck, Eike Kiltz, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. EUROCRYPT (3) 2019: 345-375 - [c74]Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs:
On the Security of Two-Round Multi-Signatures. IEEE Symposium on Security and Privacy 2019: 1084-1101 - [i60]Eduard Hauck, Eike Kiltz, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. IACR Cryptol. ePrint Arch. 2019: 260 (2019) - [i59]Benedikt Auerbach, Federico Giacon, Eike Kiltz:
Everybody's a Target: Scalability in Public-Key Encryption. IACR Cryptol. ePrint Arch. 2019: 364 (2019) - 2018
- [j22]Saqib A. Kakvi, Eike Kiltz:
Optimal Security Proofs for Full Domain Hash, Revisited. J. Cryptol. 31(1): 276-306 (2018) - [j21]Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 238-268 (2018) - [c73]Georg Fuchsbauer, Eike Kiltz, Julian Loss:
The Algebraic Group Model and its Applications. CRYPTO (2) 2018: 33-62 - [c72]Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. EUROCRYPT (3) 2018: 552-586 - [c71]Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. EuroS&P 2018: 353-367 - [c70]Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-user Setting, Revisited. Public Key Cryptography (1) 2018: 159-189 - [c69]Benedikt Auerbach, Mihir Bellare, Eike Kiltz:
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. Public Key Cryptography (1) 2018: 348-377 - [i58]Benedikt Auerbach, Mihir Bellare, Eike Kiltz:
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups. IACR Cryptol. ePrint Arch. 2018: 23 (2018) - [i57]Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh:
Generic Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2018: 928 (2018) - [i56]Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. IACR Cryptol. ePrint Arch. 2018: 1183 (2018) - 2017
- [j20]Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Luis Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. J. Cryptol. 30(1): 242-288 (2017) - [j19]Eike Kiltz, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP Under Chosen-Plaintext Attack. J. Cryptol. 30(3): 889-919 (2017) - [j18]Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain:
Efficient Authentication from Hard Learning Problems. J. Cryptol. 30(4): 1238-1275 (2017) - [c68]Eike Kiltz, Julian Loss, Jiaxin Pan:
Tightly-Secure Signatures from Five-Move Identification Protocols. ASIACRYPT (3) 2017: 68-94 - [c67]Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz:
Memory-Tight Reductions. CRYPTO (1) 2017: 101-132 - [c66]Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz:
A Modular Analysis of the Fujisaki-Okamoto Transformation. TCC (1) 2017: 341-371 - [c65]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and Its Variants. TCC (2) 2017: 519-534 - [i55]Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz:
A Modular Analysis of the Fujisaki-Okamoto Transformation. IACR Cryptol. ePrint Arch. 2017: 604 (2017) - [i54]Eike Kiltz, Julian Loss:
The Algebraic Group Model and its Applications. IACR Cryptol. ePrint Arch. 2017: 620 (2017) - [i53]Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Damien Stehlé:
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. IACR Cryptol. ePrint Arch. 2017: 634 (2017) - [i52]Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz:
Memory-Tight Reductions. IACR Cryptol. ePrint Arch. 2017: 675 (2017) - [i51]Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-User Setting, Revisited. IACR Cryptol. ePrint Arch. 2017: 843 (2017) - [i50]Eike Kiltz, Julian Loss, Jiaxin Pan:
Tightly-Secure Signatures from Five-Move Identification Protocols. IACR Cryptol. ePrint Arch. 2017: 870 (2017) - [i49]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and its Variants. IACR Cryptol. ePrint Arch. 2017: 890 (2017) - [i48]Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. IACR Cryptol. ePrint Arch. 2017: 916 (2017) - 2016
- [j17]Felix Heuer, Tibor Jager, Sven Schäge, Eike Kiltz:
Selective opening security of practical public-key encryption schemes. IET Inf. Secur. 10(6): 304-318 (2016) - [c64]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the Provable Security of (EC)DSA Signatures. CCS 2016: 1651-1662 - [c63]Eike Kiltz, Daniel Masny, Jiaxin Pan:
Optimal Security Proofs for Signatures from Identification Schemes. CRYPTO (2) 2016: 33-61 - [c62]Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly CCA-Secure Encryption Without Pairings. EUROCRYPT (1) 2016: 1-27 - [c61]David Cash, Eike Kiltz, Stefano Tessaro:
Two-Round Man-in-the-Middle Security from LPN. TCC (A1) 2016: 225-248 - [c60]Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. TCC (A1) 2016: 282-305 - [i47]Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly Secure CCA-Secure Encryption without Pairings. IACR Cryptol. ePrint Arch. 2016: 94 (2016) - [i46]Eike Kiltz, Daniel Masny, Jiaxin Pan:
Optimal Security Proofs for Signatures from Identification Schemes. IACR Cryptol. ePrint Arch. 2016: 191 (2016) - [i45]Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge:
On the Selective Opening Security of Practical Public-Key Encryption Schemes. IACR Cryptol. ePrint Arch. 2016: 342 (2016) - 2015
- [j16]Mihir Bellare, Dennis Hofheinz, Eike Kiltz:
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? J. Cryptol. 28(1): 29-48 (2015) - [c59]Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. CRYPTO (2) 2015: 275-295 - [c58]Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. EUROCRYPT (2) 2015: 101-128 - [c57]Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge:
On the Selective Opening Security of Practical Public-Key Encryption Schemes. Public Key Cryptography 2015: 27-51 - [c56]David Cash, Rafael Dowsley, Eike Kiltz:
Digital Signatures from Strong RSA without Prime Generation. Public Key Cryptography 2015: 217-235 - [c55]Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan:
Tightly-Secure Signatures from Chameleon Hash Functions. Public Key Cryptography 2015: 256-279 - [c54]Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li:
Tightly-Secure Authenticated Key Exchange. TCC (1) 2015: 629-658 - [i44]Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. IACR Cryptol. ePrint Arch. 2015: 216 (2015) - [i43]Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. IACR Cryptol. ePrint Arch. 2015: 401 (2015) - [i42]Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptol. ePrint Arch. 2015: 604 (2015) - [i41]Felix Heuer, Eike Kiltz, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. IACR Cryptol. ePrint Arch. 2015: 853 (2015) - [i40]David Cash, Eike Kiltz, Stefano Tessaro:
Two-Round Man-in-the-Middle Security from LPN. IACR Cryptol. ePrint Arch. 2015: 1220 (2015) - 2014
- [c53]Olivier Blazy, Eike Kiltz, Jiaxin Pan:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. CRYPTO (1) 2014: 408-425 - [c52]Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. Public Key Cryptography 2014: 1-18 - [i39]Olivier Blazy, Eike Kiltz, Jiaxin Pan:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. IACR Cryptol. ePrint Arch. 2014: 581 (2014) - [i38]Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li:
Tightly-Secure Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2014: 797 (2014) - [i37]Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan:
Tightly-Secure Signatures from Chameleon Hash Functions. IACR Cryptol. ePrint Arch. 2014: 1021 (2014) - 2013
- [j15]David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev:
More Constructions of Lossy and Correlation-Secure Trapdoor Functions. J. Cryptol. 26(1): 39-74 (2013) - [j14]Dennis Hofheinz, Eike Kiltz, Victor Shoup:
Practical Chosen Ciphertext Secure Encryption from Factoring. J. Cryptol. 26(1): 102-118 (2013) - [c51]Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge L. Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. CRYPTO (2) 2013: 129-147 - [c50]Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy:
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions. CRYPTO (1) 2013: 571-588 - [c49]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. Public Key Cryptography 2013: 254-271 - [i36]Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge L. Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2013: 377 (2013) - 2012
- [j13]Dennis Hofheinz, Eike Kiltz:
Programmable Hash Functions and Their Applications. J. Cryptol. 25(3): 484-527 (2012) - [j12]David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert:
Bonsai Trees, or How to Delegate a Lattice Basis. J. Cryptol. 25(4): 601-639 (2012) - [c48]Saqib A. Kakvi, Eike Kiltz, Alexander May:
Certifying RSA. ASIACRYPT 2012: 404-414 - [c47]Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters:
Identity-Based (Lossy) Trapdoor Functions and Applications. EUROCRYPT 2012: 228-245 - [c46]Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. EUROCRYPT 2012: 355-374 - [c45]Saqib A. Kakvi, Eike Kiltz:
Optimal Security Proofs for Full Domain Hash, Revisited. EUROCRYPT 2012: 537-553 - [c44]Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak:
Lapin: An Efficient Authentication Protocol Based on Ring-LPN. FSE 2012: 346-365 - [c43]Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel:
DDH-Like Assumptions Based on Extension Rings. Public Key Cryptography 2012: 644-661 - [i35]Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. IACR Cryptol. ePrint Arch. 2012: 59 (2012) - [i34]Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy:
Digital Signatures with Minimal Overhead. IACR Cryptol. ePrint Arch. 2012: 658 (2012) - [i33]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. IACR Cryptol. ePrint Arch. 2012: 732 (2012) - 2011
- [c42]Dennis Hofheinz, Tibor Jager, Eike Kiltz:
Short Signatures from Weaker Assumptions. ASIACRYPT 2011: 647-666 - [c41]Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi:
Efficient Authentication from Hard Learning Problems. EUROCRYPT 2011: 7-26 - [i32]Dennis Hofheinz, Eike Kiltz:
Programmable Hash Functions and Their Applications. IACR Cryptol. ePrint Arch. 2011: 270 (2011) - [i31]Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel:
DDH-like Assumptions Based on Extension Rings. IACR Cryptol. ePrint Arch. 2011: 280 (2011) - [i30]Dennis Hofheinz, Tibor Jager, Eike Kiltz:
Short Signatures From Weaker Assumptions. IACR Cryptol. ePrint Arch. 2011: 296 (2011) - [i29]Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters:
Identity-Based (Lossy) Trapdoor Functions and Applications. IACR Cryptol. ePrint Arch. 2011: 479 (2011) - [i28]Eike Kiltz, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP under Chosen-Plaintext Attack.