Juniorprofessur für Kryptographische Protokolle

Address:
Martensstraße 3
91058 Erlangen


Publications (Download BibTeX)


Döttling, N. (2017). Identity-based encryption from the diffie-hellman assumption. Springer Verlag.
Döttling, N. (2017). Cryptanalysis of indistinguishability obfuscations of circuits over GGH13. Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing.
Döttling, N. (2017). Laconic Oblivious Transfer and Its Applications. Springer Verlag.
Döttling, N. (2017). Concurrently composable security with shielded super-polynomial simulators. Springer Verlag.
Döttling, N. (2016). Rate-1, linear time and additively homomorphic UC commitments. Springer Verlag.
Döttling, N. (2016). Low Noise LPN: Key dependent message secure public key encryption an sample amplification. IET Information Security, 10(6), 372-385. https://dx.doi.org/10.1049/iet-ifs.2015.0495
Döttling, N., Fleischhacker, N., Krupp, J., & Schröder, D. (2016). Two-message, oblivious evaluation of cryptographic functionalities. Heidelberg: Springer Verlag.
Döttling, N. (2015). Linear secret sharing schemes from error correcting codes and universal hash functions. Springer Verlag.
Döttling, N., & Schröder, D. (2015). Efficient pseudorandom functions via on-the-fly adaptation. Springer Verlag.
Döttling, N. (2015). From stateful hardware to resettable hardware using symmetric assumptions. Springer Verlag.
Döttling, N. (2015). General statistically secure computation with bounded-resettable hardware tokens. Springer Verlag.
Döttling, N. (2013). Lossy codes and a new variant of the learning-with-errors problem.
Döttling, N. (2013). Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens.
Döttling, N. (2012). IND-CCA secure cryptography based on a variant of the LPN problem.
Döttling, N. (2012). A CCA2 secure variant of the mceliece cryptosystem. IEEE Transactions on Information Theory, 58(10), 6672-6680. https://dx.doi.org/10.1109/TIT.2012.2203582
Döttling, N. (2012). Statistically secure linear-rate dimension extension for oblivious affine function evaluation.
Döttling, N. (2011). Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity. Springer Verlag.
Döttling, N. (2011). Efficient reductions for non-signaling cryptographic primitives.
Döttling, N. (2011). Unconditional and composable security using a single stateful tamper-proof hardware token.

Last updated on 2019-24-04 at 10:19