Lehrstuhl für Informatik 13 (Angewandte Kryptographie)

Address:
Fürther Straße 246 c
90429 Nürnberg



Subordinate Organisational Units

Juniorprofessur für Kryptographische Protokolle


Research Fields

Cryptographic Protocols
Foundations


Related Project(s)


(PeRsOnal MedIcal SafE):
PROMISE: Development of the underlying cryptographic algorithms and of the cloud application
Prof. Dr. Dominique Schröder
(01/07/2017 - 31/10/2019)


(SFB 1223: Methods and Tools for Understanding and Controlling Privacy):
SFB 1223: Privacy-Preserving Cloud Storage (B04)
Prof. Dr. Dominique Schröder
(01/01/2016)



Publications (Download BibTeX)

Go to first page Go to previous page 1 of 4 Go to next page Go to last page

Deuber, D., Magri, B., & Thyagarajan, S.A.K. (2019). Redactable Blockchain in the Permissionless Setting. SAN FRANCISCO, CA, US.
Deuber, D., Egger, C., Fech, K., Malavolta, G., Schröder, D., Thyagarajan, S.A.K.,... Durand, C. (2019). My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. Proceedings on Privacy Enhancing Technologies, 2019(1), 108-132. https://dx.doi.org/10.2478/popets-2019-0007
Lai, R.W.F., Egger, C., Reinert, M., Chow, S.S., Maffei, M., & Schröder, D. (2018). Simple Password-Hardened Encryption Services. In USENIX Association (Eds.), 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, US: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Deuber, D., Maffei, M., Malavolta, G., Rabkin, M., Schröder, D., & Simkin, M. (2018). Functional Credentials. Proceedings on Privacy Enhancing Technologies, 2, 64-84.
Meiser, S., & Schröder, D. (2018). Delegatable functional signatures. IET Information Security, 12(3), 194-206.
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D., & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. IET Information Security, 12(3), 166-183.
Lai, R.W.F., Egger, C., Schröder, D., & Chow, S.S. (2017). Phoenix: Rebirth of a Cryptographic Password-Hardening Service. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 899--916). Vancouver, BC, CA: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Ruffing, T., & Malavolta, G. (2017). Switch Commitments: A Safety Switch for Confidential Transactions. In Proceedings of the 4th Workshop on Bitcoin and Blockchain Research (BITCOIN). Malta.
Schröder, D., & Unruh, D. (2017). Security of Blind Signatures Revisited. Journal of Cryptology, 30(2), 470-494. https://dx.doi.org/10.1007/s00145-015-9225-1
Ateniese, G., Magri, B., Venturi, D., & Andrade, E. (2017). Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends. In IEEE European Symposium on Security and Privacy 2017 (EuroS&P). Paris, France.
Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). Concurrency and Privacy with Payment-Channel Networks. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS). Dallas, USA: Dallas, USA.
Malavolta, G., & Schröder, D. (2017). Efficient Ring Signatures in the Standard Model. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT). Hong Kong.
Katz, J., Maffei, M., Malavolta, G., & Schröder, D. (2017). Subset Predicate Encryption and its Applications. In Proceedings of the 16th International Conference on Cryptology and Network Security (CANS). Hong Kong: Hong Kong.
Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In Proceedings of the 24th Annual Network & Distributed System Security Symposium (NDSS). San Diego, USA.
Maffei, M., Malavolta, G., Reinert, M., & Schröder, D. (2017). Maliciously Secure Multi-Client ORAM. In International Conference on Applied Cryptography and Network Security (ACNS). Kanazawa, Japan.
Döttling, N., Fleischhacker, N., Krupp, J., & Schröder, D. (2016). Two-message, oblivious evaluation of cryptographic functionalities. Heidelberg: Springer Verlag.
Lai, R.W., Zhang, T., Chow, S.S., & Schröder, D. (2016). Efficient sanitizable signatures without random oracles. Springer Verlag.
Krupp, J., Schröder, D., Simkin, M., Fiore, D., Ateniese, G., & Nürnberger, S. (2016). Nearly optimal verifiable data streaming. Springer Verlag.
Schneider, J., Fleischhacker, N., Schröder, D., & Backes, M. (2016). Efficient cryptographic password hardening services from partially oblivious commitments. (pp. 1192-1203). Association for Computing Machinery.
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D., Simkin, M., & Malavolta, G. (2016). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. Springer Verlag.

Last updated on 2017-18-01 at 01:00