Lehrstuhl für Informatik 13 (Angewandte Kryptographie)

Fürther Straße 246 c
90429 Nürnberg

Subordinate Organisational Units

Juniorprofessur für Kryptographische Protokolle

Research Fields

Cryptographic Protocols

Related Project(s)

(PeRsOnal MedIcal SafE):
PROMISE: Development of the underlying cryptographic algorithms and of the cloud application
Prof. Dr. Dominique Schröder
(01/07/2017 - 31/10/2019)

(SFB 1223: Methods and Tools for Understanding and Controlling Privacy):
SFB 1223: Privacy-Preserving Cloud Storage (B04)
Prof. Dr. Dominique Schröder

Publications (Download BibTeX)

Go to first page Go to previous page 1 of 4 Go to next page Go to last page

Deuber, D., Magri, B., & Thyagarajan, S.A.K. (2019). Redactable Blockchain in the Permissionless Setting. In Proceedings of the 40th IEEE Symposium on Security and Privacy. SAN FRANCISCO, CA, US.
Choi, S.G., Katz, J., Schröder, D., Yerukhimovich, A., & Zhou, H.-S. (2019). (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. Journal of Cryptology, 32(2), 459-497. https://dx.doi.org/10.1007/s00145-018-9288-x
Fleischhacker, N., Jager, T., & Schröder, D. (2019). On Tight Security Proofs for Schnorr Signatures. Journal of Cryptology, 32(2), 566-599. https://dx.doi.org/10.1007/s00145-019-09311-5
Döttling, N., Lai, R.W.F., & Malavolta, G. (2019). Incremental proofs of sequential work. In Yuval Ishai, Vincent Rijmen (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 292-323). Darmstadt, DE: Springer Verlag.
Deuber, D., Egger, C., Fech, K., Malavolta, G., Schröder, D., Thyagarajan, S.A.K.,... Durand, C. (2019). My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. Proceedings on Privacy Enhancing Technologies, 2019(1), 108-132. https://dx.doi.org/10.2478/popets-2019-0007
Bultel, X., Lafourcade, P., Lai, R.W.F., Malavolta, G., Schröder, D., & Thyagarajan, S.A.K. (2019). Efficient Invisible and Unlinkable Sanitizable Signatures. In Dongdai Lin, Kazue Sako (Eds.), Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. (pp. 159-189). Springer Verlag.
Zoppelt, M., & Tavakoli Kolagari, R. (2019). SAM: A Security Abstraction Model for Automotive Software Systems. Springer Verlag.
Auernhammer, K., Tavakoli Kolagari, R., & Zoppelt, M. (2019). Attacks on machine learning: Lurking danger for accountability. In Proceedings of the 2019 AAAI Workshop on Artificial Intelligence Safety, SafeAI 2019. CEUR-WS.
Zoppelt, M., & Tavakoli Kolagari, R. (2019). UnCle SAM : Modeling Cloud Attacks with the Automotive Security Abstraction Model. In CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization (pp. 67--72). Venice, Italy.
Dachman-Soled, D., Fleischhacker, N., Katz, J., Lysyanskaya, A., & Schröder, D. (2019). Feasibility and Infeasibility of Secure Computation with Malicious PUFs. Journal of Cryptology. https://dx.doi.org/10.1007/s00145-019-09329-9
Lai, R.W.F., Egger, C., Reinert, M., Chow, S.S., Maffei, M., & Schröder, D. (2018). Simple Password-Hardened Encryption Services. In USENIX Association (Eds.), 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, US: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Deuber, D., Maffei, M., Malavolta, G., Rabkin, M., Schröder, D., & Simkin, M. (2018). Functional Credentials. Proceedings on Privacy Enhancing Technologies, 2, 64-84.
Meiser, S., & Schröder, D. (2018). Delegatable functional signatures. IET Information Security, 12(3), 194-206.
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D., & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. IET Information Security, 12(3), 166-183.
Lai, R.W.F., Egger, C., Schröder, D., & Chow, S.S. (2017). Phoenix: Rebirth of a Cryptographic Password-Hardening Service. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 899--916). Vancouver, BC, CA: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Maffei, M., Malavolta, G., Reinert, M., & Schröder, D. (2017). Maliciously Secure Multi-Client ORAM. In International Conference on Applied Cryptography and Network Security (ACNS). Kanazawa, Japan.
Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). Concurrency and Privacy with Payment-Channel Networks. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS). Dallas, USA: Dallas, USA.
Katz, J., Maffei, M., Malavolta, G., & Schröder, D. (2017). Subset Predicate Encryption and its Applications. In Proceedings of the 16th International Conference on Cryptology and Network Security (CANS). Hong Kong: Hong Kong.
Malavolta, G., & Schröder, D. (2017). Efficient Ring Signatures in the Standard Model. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT). Hong Kong.
Schröder, D., & Unruh, D. (2017). Security of Blind Signatures Revisited. Journal of Cryptology, 30(2), 470-494. https://dx.doi.org/10.1007/s00145-015-9225-1

Last updated on 2019-24-04 at 10:23