Lehrstuhl für Informatik 13 (Angewandte Kryptographie)

Adresse:
Fürther Straße 246 c
90429 Nürnberg



Untergeordnete Organisationseinheiten

Juniorprofessur für Kryptographische Protokolle


Forschungsbereiche

Grundlagenforschung
Kryptographische Protokolle


Forschungsprojekt(e)


(PeRsOnal MedIcal SafE):
PROMISE: Entwicklung der unterliegenden kryptographischen Algorithmen und der Cloud-Applikation
Prof. Dr. Dominique Schröder
(01.07.2017 - 31.10.2019)


(SFB 1223: Methoden und Instrumente zum Verständnis und zur Kontrolle von Datenschutz):
SFB 1223: Privacyfreundliches Speichern in der Cloud (B04)
Prof. Dr. Dominique Schröder
(01.01.2016)



Publikationen (Download BibTeX)

Go to first page Go to previous page 1 von 4 Go to next page Go to last page

Deuber, D., Magri, B., & Thyagarajan, S.A.K. (2019). Redactable Blockchain in the Permissionless Setting. In Proceedings of the 40th IEEE Symposium on Security and Privacy. SAN FRANCISCO, CA, US.
Choi, S.G., Katz, J., Schröder, D., Yerukhimovich, A., & Zhou, H.-S. (2019). (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. Journal of Cryptology, 32(2), 459-497. https://dx.doi.org/10.1007/s00145-018-9288-x
Fleischhacker, N., Jager, T., & Schröder, D. (2019). On Tight Security Proofs for Schnorr Signatures. Journal of Cryptology, 32(2), 566-599. https://dx.doi.org/10.1007/s00145-019-09311-5
Zoppelt, M., & Tavakoli Kolagari, R. (2019). UnCle SAM : Modeling Cloud Attacks with the Automotive Security Abstraction Model. In CLOUD COMPUTING 2019, The Tenth International Conference on Cloud Computing, GRIDs, and Virtualization (pp. 67--72). Venice, Italy.
Lai, R.W.F., & Malavolta, G. (2019). Subvector Commitments with Application to Succinct Arguments. In Daniele Micciancio, Alexandra Boldyreva (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 530-560). Santa Barbara, CA, US: Springer Verlag.
Zoppelt, M., & Tavakoli Kolagari, R. (2019). SAM: A Security Abstraction Model for Automotive Software Systems. Springer Verlag.
Malavolta, G., & Thyagarajan, S.A.K. (2019). Homomorphic Time-Lock Puzzles and Applications. In Daniele Micciancio, Alexandra Boldyreva (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 620-649). Santa Barbara, CA, US: Springer Verlag.
Auernhammer, K., Tavakoli Kolagari, R., & Zoppelt, M. (2019). Attacks on machine learning: Lurking danger for accountability. In Proceedings of the 2019 AAAI Workshop on Artificial Intelligence Safety, SafeAI 2019. CEUR-WS.
Dachman-Soled, D., Fleischhacker, N., Katz, J., Lysyanskaya, A., & Schröder, D. (2019). Feasibility and Infeasibility of Secure Computation with Malicious PUFs. Journal of Cryptology. https://dx.doi.org/10.1007/s00145-019-09329-9
Döttling, N., Lai, R.W.F., & Malavolta, G. (2019). Incremental proofs of sequential work. In Yuval Ishai, Vincent Rijmen (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 292-323). Darmstadt, DE: Springer Verlag.
Bultel, X., Lafourcade, P., Lai, R.W.F., Malavolta, G., Schröder, D., & Thyagarajan, S.A.K. (2019). Efficient Invisible and Unlinkable Sanitizable Signatures. In Dongdai Lin, Kazue Sako (Eds.), Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. (pp. 159-189). Springer Verlag.
Deuber, D., Egger, C., Fech, K., Malavolta, G., Schröder, D., Thyagarajan, S.A.K.,... Durand, C. (2019). My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. Proceedings on Privacy Enhancing Technologies, 2019(1), 108-132. https://dx.doi.org/10.2478/popets-2019-0007
Lai, R.W.F., Egger, C., Reinert, M., Chow, S.S., Maffei, M., & Schröder, D. (2018). Simple Password-Hardened Encryption Services. In USENIX Association (Eds.), 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, US: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D., & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. IET Information Security, 12(3), 166-183.
Meiser, S., & Schröder, D. (2018). Delegatable functional signatures. IET Information Security, 12(3), 194-206.
Deuber, D., Maffei, M., Malavolta, G., Rabkin, M., Schröder, D., & Simkin, M. (2018). Functional Credentials. Proceedings on Privacy Enhancing Technologies, 2, 64-84.
Lai, R.W.F., Egger, C., Schröder, D., & Chow, S.S. (2017). Phoenix: Rebirth of a Cryptographic Password-Hardening Service. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 899--916). Vancouver, BC, CA: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Ateniese, G., Magri, B., Venturi, D., & Andrade, E. (2017). Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends. In IEEE European Symposium on Security and Privacy 2017 (EuroS&P). Paris, France.
Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In Proceedings of the 24th Annual Network & Distributed System Security Symposium (NDSS). San Diego, USA.
Ruffing, T., & Malavolta, G. (2017). Switch Commitments: A Safety Switch for Confidential Transactions. In Proceedings of the 4th Workshop on Bitcoin and Blockchain Research (BITCOIN). Malta.

Zuletzt aktualisiert 2019-24-04 um 10:23