BibTeX records: Nico Döttling

download as .bib file

@inproceedings{DBLP:conf/acns/AlkadriDP24,
  author       = {Nabil Alkeilani Alkadri and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Practical Lattice-Based Distributed Signatures for a Small Number
                  of Signers},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {376--402},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_15},
  doi          = {10.1007/978-3-031-54770-6\_15},
  timestamp    = {Mon, 11 Mar 2024 15:20:49 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AlkadriDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrancoDS24,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Akshayaram Srinivasan},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14656},
  pages        = {271--300},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58751-1\_10},
  doi          = {10.1007/978-3-031-58751-1\_10},
  timestamp    = {Thu, 09 May 2024 11:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrancoDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DottlingM24,
  author       = {Nico D{\"{o}}ttling and
                  Tamer Mour},
  editor       = {Venkatesan Guruswami},
  title        = {On the Black-Box Complexity of Correlation Intractability},
  booktitle    = {15th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2024, January 30 to February 2, 2024, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {287},
  pages        = {40:1--40:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2024},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2024.40},
  doi          = {10.4230/LIPICS.ITCS.2024.40},
  timestamp    = {Wed, 24 Jan 2024 15:25:09 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/DottlingM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrancoDSZ24,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Akshayaram Srinivasan and
                  Riccardo Zanotto},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Rate-1 Fully Local Somewhere Extractable Hashing from {DDH}},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14603},
  pages        = {356--386},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57725-3\_12},
  doi          = {10.1007/978-3-031-57725-3\_12},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrancoDSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrancoDSZ24,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Akshayaram Srinivasan and
                  Riccardo Zanotto},
  title        = {Rate-1 Fully Local Somewhere Extractable Hashing from {DDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/216},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrancoDSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrancoDS24,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Akshayaram Srinivasan},
  title        = {Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/372},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrancoDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlkadriDP24,
  author       = {Nabil Alkeilani Alkadri and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  title        = {Practical Lattice-Based Distributed Signatures for a Small Number
                  of Signers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {449},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/449},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlkadriDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/AggarwalDDHMO23,
  author       = {Divesh Aggarwal and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic and
                  Mohammad Hajiabadi and
                  Giulio Malavolta and
                  Maciej Obremski},
  title        = {Algebraic Restriction Codes and Their Applications},
  journal      = {Algorithmica},
  volume       = {85},
  number       = {12},
  pages        = {3602--3648},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00453-023-01150-y},
  doi          = {10.1007/S00453-023-01150-Y},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/AggarwalDDHMO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BrakerskiDGM23,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  title        = {Candidate iO from Homomorphic Encryption Schemes},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {3},
  pages        = {27},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09471-5},
  doi          = {10.1007/S00145-023-09471-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/BrakerskiDGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PuTDH23,
  author       = {Sihang Pu and
                  Sri Aravinda Krishnan Thyagarajan and
                  Nico D{\"{o}}ttling and
                  Lucjan Hanzlik},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Post Quantum Fuzzy Stealth Signatures and Applications},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {371--385},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623148},
  doi          = {10.1145/3576915.3623148},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PuTDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrancoDS23,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Akshayaram Srinivasan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {A Framework for Statistically Sender Private {OT} with Optimal Rate},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {548--576},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_18},
  doi          = {10.1007/978-3-031-38557-5\_18},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrancoDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DottlingKLLMR23,
  author       = {Nico D{\"{o}}ttling and
                  Dimitris Kolonelos and
                  Russell W. F. Lai and
                  Chuanwei Lin and
                  Giulio Malavolta and
                  Ahmadreza Rahimi},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Efficient Laconic Cryptography from Learning with Errors},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14006},
  pages        = {417--446},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30620-4\_14},
  doi          = {10.1007/978-3-031-30620-4\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DottlingKLLMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DottlingHMW23,
  author       = {Nico D{\"{o}}ttling and
                  Lucjan Hanzlik and
                  Bernardo Magri and
                  Stella Wohnig},
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {McFly: Verifiable Encryption to the Future Made Practical},
  booktitle    = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13950},
  pages        = {252--269},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47754-6\_15},
  doi          = {10.1007/978-3-031-47754-6\_15},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/DottlingHMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingGM23,
  author       = {Nico D{\"{o}}ttling and
                  Phillip Gajland and
                  Giulio Malavolta},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Laconic Function Evaluation for Turing Machines},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {606--634},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_21},
  doi          = {10.1007/978-3-031-31371-4\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingKLLMR23,
  author       = {Nico D{\"{o}}ttling and
                  Dimitris Kolonelos and
                  Russell W. F. Lai and
                  Chuanwei Lin and
                  Giulio Malavolta and
                  Ahmadreza Rahimi},
  title        = {Efficient Laconic Cryptography from Learning With Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/404},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingKLLMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGM23,
  author       = {Nico D{\"{o}}ttling and
                  Phillip Gajland and
                  Giulio Malavolta},
  title        = {Laconic Function Evaluation for Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/502},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0005DS23,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Akshayaram Srinivasan},
  title        = {A Framework for Statistically Sender Private {OT} with Optimal Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1011},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0005DS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PuTDH23,
  author       = {Sihang Pu and
                  Sri Aravinda Krishnan Thyagarajan and
                  Nico D{\"{o}}ttling and
                  Lucjan Hanzlik},
  title        = {Post Quantum Fuzzy Stealth Signatures and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1148},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1148},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PuTDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingM23,
  author       = {Nico D{\"{o}}ttling and
                  Tamer Mour},
  title        = {On The Black-Box Complexity of Correlation Intractability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1365},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1365},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BrancoDW22,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Stella Wohnig},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Universal Ring Signatures in the Standard Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  pages        = {249--278},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5\_9},
  doi          = {10.1007/978-3-031-22972-5\_9},
  timestamp    = {Fri, 03 Feb 2023 17:07:15 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BrancoDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/DottlingD22,
  author       = {Nico D{\"{o}}ttling and
                  Jesko Dujmovic},
  editor       = {Dana Dachman{-}Soled},
  title        = {Maliciously Circuit-Private {FHE} from Information-Theoretic Principles},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {4:1--4:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.4},
  doi          = {10.4230/LIPICS.ITC.2022.4},
  timestamp    = {Thu, 30 Jun 2022 16:13:48 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/DottlingD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrakerskiBDP22,
  author       = {Zvika Brakerski and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Batch-OT with Optimal Rate},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {157--186},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_6},
  doi          = {10.1007/978-3-031-07085-3\_6},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrakerskiBDP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BrakerskiDGM22,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  editor       = {Mikolaj Bojanczyk and
                  Emanuela Merelli and
                  David P. Woodruff},
  title        = {Factoring and Pairings Are Not Necessary for {IO:} Circular-Secure
                  {LWE} Suffices},
  booktitle    = {49th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2022, July 4-8, 2022, Paris, France},
  series       = {LIPIcs},
  volume       = {229},
  pages        = {28:1--28:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2022.28},
  doi          = {10.4230/LIPICS.ICALP.2022.28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/BrakerskiDGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/AggarwalDDHMO22,
  author       = {Divesh Aggarwal and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic and
                  Mohammad Hajiabadi and
                  Giulio Malavolta and
                  Maciej Obremski},
  editor       = {Mark Braverman},
  title        = {Algebraic Restriction Codes and Their Applications},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {2:1--2:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.2},
  doi          = {10.4230/LIPICS.ITCS.2022.2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/AggarwalDDHMO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/DottlingGMR22,
  author       = {Nico D{\"{o}}ttling and
                  Vipul Goyal and
                  Giulio Malavolta and
                  Justin Raizes},
  editor       = {Mark Braverman},
  title        = {Interaction-Preserving Compilers for Secure Computation},
  booktitle    = {13th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2022, January 31 - February 3, 2022, Berkeley, CA, {USA}},
  series       = {LIPIcs},
  volume       = {215},
  pages        = {57:1--57:18},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2022.57},
  doi          = {10.4230/LIPICS.ITCS.2022.57},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/innovations/DottlingGMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0005DM22,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Paulo Mateus},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Two-Round Oblivious Linear Evaluation from Learning with Errors},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13177},
  pages        = {379--408},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97121-2\_14},
  doi          = {10.1007/978-3-030-97121-2\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0005DM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrancoDD22,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Rate-1 Incompressible Encryption from Standard Assumptions},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {33--69},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_2},
  doi          = {10.1007/978-3-031-22365-5\_2},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrancoDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingGSW22,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Sruthi Sekar and
                  Mingyuan Wang},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {{IBE} with Incompressible Master Secret and Small Identity Secrets},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {588--617},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_21},
  doi          = {10.1007/978-3-031-22318-1\_21},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingGSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiBDP22,
  author       = {Zvika Brakerski and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  title        = {Batch-OT with Optimal Rate},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {314},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/314},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiBDP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingHMW22,
  author       = {Nico D{\"{o}}ttling and
                  Lucjan Hanzlik and
                  Bernardo Magri and
                  Stella Wohnig},
  title        = {McFly: Verifiable Encryption to the Future Made Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/433},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingHMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingD22,
  author       = {Nico D{\"{o}}ttling and
                  Jesko Dujmovic},
  title        = {Maliciously Circuit-Private {FHE} from Information-Theoretic Principles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {495},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/495},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGSW22,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Sruthi Sekar and
                  Mingyuan Wang},
  title        = {{IBE} with Incompressible Master Secret and Small Identity Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/649},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrancoDD22,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic},
  title        = {Rate-1 Incompressible Encryption from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/697},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrancoDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrancoDW22,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Stella Wohnig},
  title        = {Universal Ring Signatures in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1265},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1265},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrancoDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/DottlingG21,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  title        = {Identity-based Encryption from the Diffie-Hellman Assumption},
  journal      = {J. {ACM}},
  volume       = {68},
  number       = {3},
  pages        = {14:1--14:46},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422370},
  doi          = {10.1145/3422370},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jacm/DottlingG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0005DP21,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  editor       = {Juan A. Garay},
  title        = {Multiparty Cardinality Testing for Threshold Private Intersection},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {32--60},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_2},
  doi          = {10.1007/978-3-030-75248-4\_2},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0005DP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingN21,
  author       = {Nico D{\"{o}}ttling and
                  Ryo Nishimaki},
  editor       = {Juan A. Garay},
  title        = {Universal Proxy Re-Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {512--542},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_19},
  doi          = {10.1007/978-3-030-75245-3\_19},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Alamati0DGHP21,
  author       = {Navid Alamati and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Sihang Pu},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Laconic Private Set Intersection and Applications},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {94--125},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_4},
  doi          = {10.1007/978-3-030-90456-2\_4},
  timestamp    = {Mon, 08 Nov 2021 11:51:39 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Alamati0DGHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChardouvelisDM21,
  author       = {Orestis Chardouvelis and
                  Nico D{\"{o}}ttling and
                  Giulio Malavolta},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Rate-1 Quantum Fully Homomorphic Encryption},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {149--176},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_6},
  doi          = {10.1007/978-3-030-90459-3\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ChardouvelisDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingHHKSU21,
  author       = {Nico D{\"{o}}ttling and
                  Dominik Hartmann and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Bogdan Ursu},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {On the Impossibility of Purely Algebraic Signatures},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  pages        = {317--349},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2\_11},
  doi          = {10.1007/978-3-030-90456-2\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingHHKSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlamatiBDGHP21,
  author       = {Navid Alamati and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Sihang Pu},
  title        = {Laconic Private Set Intersection and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {728},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/728},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlamatiBDGHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingHHKSU21,
  author       = {Nico D{\"{o}}ttling and
                  Dominik Hartmann and
                  Dennis Hofheinz and
                  Eike Kiltz and
                  Sven Sch{\"{a}}ge and
                  Bogdan Ursu},
  title        = {On the Impossibility of Short Algebraic Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/738},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingHHKSU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalDDHMO21,
  author       = {Divesh Aggarwal and
                  Nico D{\"{o}}ttling and
                  Jesko Dujmovic and
                  Mohammad Hajiabadi and
                  Giulio Malavolta and
                  Maciej Obremski},
  title        = {Algebraic Restriction Codes and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1177},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalDDHMO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGMR21,
  author       = {Nico D{\"{o}}ttling and
                  Vipul Goyal and
                  Giulio Malavolta and
                  Justin Raizes},
  title        = {Interaction-Preserving Compilers for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1503},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1503},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DeuberDMMT20,
  author       = {Dominic Deuber and
                  Nico D{\"{o}}ttling and
                  Bernardo Magri and
                  Giulio Malavolta and
                  Sri Aravinda Krishnan Thyagarajan},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Minting Mechanism for Proof of Stake Blockchains},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {315--334},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_16},
  doi          = {10.1007/978-3-030-57808-4\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DeuberDMMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DottlingMP20,
  author       = {Nico D{\"{o}}ttling and
                  Giulio Malavolta and
                  Sihang Pu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {A Combinatorial Approach to Quantum Random Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {614--632},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_21},
  doi          = {10.1007/978-3-030-64834-3\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DottlingMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ThyagarajanBMDK20,
  author       = {Sri Aravinda Krishnan Thyagarajan and
                  Adithya Bhat and
                  Giulio Malavolta and
                  Nico D{\"{o}}ttling and
                  Aniket Kate and
                  Dominique Schr{\"{o}}der},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Verifiable Timed Signatures Made Practical},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1733--1750},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417263},
  doi          = {10.1145/3372297.3417263},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ThyagarajanBMDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrakerskiDGM20,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Candidate iO from Homomorphic Encryption Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {79--109},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_4},
  doi          = {10.1007/978-3-030-45721-1\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrakerskiDGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrakerskiD20,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Hardness of {LWE} on General Entropic Distributions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {551--575},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_19},
  doi          = {10.1007/978-3-030-45724-2\_19},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrakerskiD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DottlingGHMW20,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny and
                  Daniel Wichs},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Two-Round Oblivious Transfer from {CDH} or {LPN}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {768--797},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_26},
  doi          = {10.1007/978-3-030-45724-2\_26},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DottlingGHMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DottlingGMV20,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta and
                  Prashant Nalini Vasudevan},
  editor       = {Clemente Galdi and
                  Vladimir Kolesnikov},
  title        = {Tight Verifiable Delay Functions},
  booktitle    = {Security and Cryptography for Networks - 12th International Conference,
                  {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12238},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57990-6\_4},
  doi          = {10.1007/978-3-030-57990-6\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/DottlingGMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiD20,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Lossiness and Entropic Hardness for Ring-LWE},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {1--27},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_1},
  doi          = {10.1007/978-3-030-64375-1\_1},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Brakerski0DGM20,
  author       = {Zvika Brakerski and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {58--87},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_3},
  doi          = {10.1007/978-3-030-64375-1\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Brakerski0DGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-06993,
  author       = {Nico D{\"{o}}ttling and
                  Kathrin Grosse and
                  Michael Backes and
                  Ian M. Molloy},
  title        = {Adversarial Examples and Metrics},
  journal      = {CoRR},
  volume       = {abs/2007.06993},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.06993},
  eprinttype    = {arXiv},
  eprint       = {2007.06993},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-06993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiD20,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling},
  title        = {Hardness of {LWE} on General Entropic Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/119},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiDGM20,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  title        = {Candidate iO from Homomorphic Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/394},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiDGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrancoDM20,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Paulo Mateus},
  title        = {Two-Round Oblivious Linear Evaluation from Learning with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/635},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrancoDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiDGM20a,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  title        = {Factoring and Pairings are not Necessary for iO: Circular-Secure {LWE}
                  Suffices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1024},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1024},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiDGM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiD20a,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling},
  title        = {Lossiness and Entropic Hardness for Ring-LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1185},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1185},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiD20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiBDGM20,
  author       = {Zvika Brakerski and
                  Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  title        = {Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1186},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1186},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiBDGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrancoDP20,
  author       = {Pedro Branco and
                  Nico D{\"{o}}ttling and
                  Sihang Pu},
  title        = {Multiparty Cardinality Testing for Threshold Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1307},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1307},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BrancoDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingMP20,
  author       = {Nico D{\"{o}}ttling and
                  Giulio Malavolta and
                  Sihang Pu},
  title        = {A Combinatorial Approach to Quantum Random Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1508},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1508},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ThyagarajanBMDK20,
  author       = {Sri Aravinda Krishnan Thyagarajan and
                  Adithya Bhat and
                  Giulio Malavolta and
                  Nico D{\"{o}}ttling and
                  Aniket Kate and
                  Dominique Schr{\"{o}}der},
  title        = {Verifiable Timed Signatures Made Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1563},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1563},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ThyagarajanBMDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DottlingGHLM19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Kevin Liu and
                  Giulio Malavolta},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {585--606},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_20},
  doi          = {10.1007/978-3-030-34618-8\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DottlingGHLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CascudoDDDDG19,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Rafael Dowsley and
                  Irene Giacomelli},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Efficient {UC} Commitment Extension with Homomorphism for Free (and
                  Applications)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {606--635},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_22},
  doi          = {10.1007/978-3-030-34621-8\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CascudoDDDDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingGIMMO19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Yuval Ishai and
                  Giulio Malavolta and
                  Tamer Mour and
                  Rafail Ostrovsky},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Trapdoor Hash Functions and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_1},
  doi          = {10.1007/978-3-030-26954-8\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingGIMMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/0001DHKS19,
  author       = {Michael Backes and
                  Nico D{\"{o}}ttling and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Jonas Schneider},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  pages        = {281--311},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4\_10},
  doi          = {10.1007/978-3-030-17659-4\_10},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/0001DHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DottlingLM19,
  author       = {Nico D{\"{o}}ttling and
                  Russell W. F. Lai and
                  Giulio Malavolta},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Incremental Proofs of Sequential Work},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11477},
  pages        = {292--323},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17656-3\_11},
  doi          = {10.1007/978-3-030-17656-3\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DottlingLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AggarwalDNOP19,
  author       = {Divesh Aggarwal and
                  Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen and
                  Maciej Obremski and
                  Erick Purwanto},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Continuous Non-Malleable Codes in the 8-Split-State Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {531--561},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_18},
  doi          = {10.1007/978-3-030-17653-2\_18},
  timestamp    = {Tue, 14 May 2019 13:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AggarwalDNOP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DottlingGGM19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Vipul Goyal and
                  Giulio Malavolta},
  editor       = {David Zuckerman},
  title        = {Laconic Conditional Disclosure of Secrets and Applications},
  booktitle    = {60th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2019, Baltimore, Maryland, USA, November 9-12, 2019},
  pages        = {661--685},
  publisher    = {{IEEE} Computer Society},
  year         = {2019},
  url          = {https://doi.org/10.1109/FOCS.2019.00046},
  doi          = {10.1109/FOCS.2019.00046},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DottlingGGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiDGM19,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption
                  and Time-Lock Puzzles},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {407--437},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_16},
  doi          = {10.1007/978-3-030-36033-7\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiDGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BackesDHKS19,
  author       = {Michael Backes and
                  Nico D{\"{o}}ttling and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Jonas Schneider},
  title        = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BackesDHKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHMW19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny and
                  Daniel Wichs},
  title        = {Two-Round Oblivious Transfer from {CDH} or {LPN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/414},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGIMMO19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Yuval Ishai and
                  Giulio Malavolta and
                  Tamer Mour and
                  Rafail Ostrovsky},
  title        = {Trapdoor Hash Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/639},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGIMMO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingLM19,
  author       = {Nico D{\"{o}}ttling and
                  Russell W. F. Lai and
                  Giulio Malavolta},
  title        = {Incremental Proofs of Sequential Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGMV19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta and
                  Prashant Nalini Vasudevan},
  title        = {Tight Verifiable Delay Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {659},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/659},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiDGM19,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Giulio Malavolta},
  title        = {Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption
                  and Time-Lock Puzzles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/720},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiDGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHLM19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Kevin Liu and
                  Giulio Malavolta},
  title        = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1072},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1072},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGGM19,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Vipul Goyal and
                  Giulio Malavolta},
  title        = {Laconic Conditional Disclosure of Secrets and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1353},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1353},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DottlingG0MM18,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Pratyay Mukherjee},
  editor       = {Debrup Chakraborty and
                  Tetsu Iwata},
  title        = {Obfuscation from Low Noise Multilinear Maps},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
                  on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11356},
  pages        = {329--352},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05378-9\_18},
  doi          = {10.1007/978-3-030-05378-9\_18},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DottlingG0MM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingGHM18,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_1},
  doi          = {10.1007/978-3-319-76578-5\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BrakerskiD18,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Two-Message Statistically Sender-Private {OT} from {LWE}},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {370--390},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_14},
  doi          = {10.1007/978-3-030-03810-6\_14},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BrakerskiD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrakerskiD18,
  author       = {Zvika Brakerski and
                  Nico D{\"{o}}ttling},
  title        = {Two-Message Statistical Sender-Private {OT} from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {530},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/530},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrakerskiD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingN18,
  author       = {Nico D{\"{o}}ttling and
                  Ryo Nishimaki},
  title        = {Universal Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDDDG18,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Rafael Dowsley and
                  Irene Giacomelli},
  title        = {Efficient {UC} Commitment Extension with Homomorphism for Free (and
                  Applications)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {983},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/983},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDDDDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeuberDMMT18,
  author       = {Dominic Deuber and
                  Nico D{\"{o}}ttling and
                  Bernardo Magri and
                  Giulio Malavolta and
                  Sri Aravinda Krishnan Thyagarajan},
  title        = {Minting Mechanisms for Blockchain - or - Moving from Cryptoassets
                  to Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1110},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeuberDMMT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DottlingGNNT17,
  author       = {Nico D{\"{o}}ttling and
                  Satrajit Ghosh and
                  Jesper Buus Nielsen and
                  Tobias Nilges and
                  Roberto Trifiletti},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious
                  Linear Function Evaluation},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2263--2276},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134024},
  doi          = {10.1145/3133956.3134024},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DottlingGNNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoDG0MP17,
  author       = {Chongwon Cho and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Antigoni Polychroniadou},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Laconic Oblivious Transfer and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {33--65},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_2},
  doi          = {10.1007/978-3-319-63715-0\_2},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoDG0MP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingG17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Identity-Based Encryption from the Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {537--569},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_18},
  doi          = {10.1007/978-3-319-63688-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BroadnaxDHMN17,
  author       = {Brandon Broadnax and
                  Nico D{\"{o}}ttling and
                  Gunnar Hartung and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Matthias Nagel},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Concurrently Composable Security with Shielded Super-Polynomial Simulators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {351--381},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_13},
  doi          = {10.1007/978-3-319-56620-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BroadnaxDHMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AponDGM17,
  author       = {Daniel Apon and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Pratyay Mukherjee},
  editor       = {Ioannis Chatzigiannakis and
                  Piotr Indyk and
                  Fabian Kuhn and
                  Anca Muscholl},
  title        = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over
                  {GGH13}},
  booktitle    = {44th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2017, July 10-14, 2017, Warsaw, Poland},
  series       = {LIPIcs},
  volume       = {80},
  pages        = {38:1--38:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2017.38},
  doi          = {10.4230/LIPICS.ICALP.2017.38},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AponDGM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/CramerDDGX17,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  editor       = {Junji Shikata},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {1--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_1},
  doi          = {10.1007/978-3-319-72089-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingG17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {From Selective {IBE} to Full {IBE} and Selective {HIBE}},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {372--408},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_13},
  doi          = {10.1007/978-3-319-70500-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/DottlingNO17,
  author       = {Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen and
                  Maciej Obremski},
  title        = {Information Theoretic Continuously Non-Malleable Codes in the Constant
                  Split-State Model},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-078}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/078},
  eprinttype    = {ECCC},
  eprint       = {TR17-078},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/DottlingNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingNO17,
  author       = {Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen and
                  Maciej Obremski},
  title        = {Information Theoretic Continuously Non-Malleable Codes in the Constant
                  Split-State Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/357},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingNO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoDG0MP17,
  author       = {Chongwon Cho and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Antigoni Polychroniadou},
  title        = {Laconic Oblivious Transfer and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/491},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoDG0MP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingG17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  title        = {Identity-Based Encryption from the Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/543},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGNNT17,
  author       = {Nico D{\"{o}}ttling and
                  Satrajit Ghosh and
                  Jesper Buus Nielsen and
                  Tobias Nilges and
                  Roberto Trifiletti},
  title        = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious
                  Linear Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {790},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/790},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGNNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingG17a,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg},
  title        = {From Selective {IBE} to Full {IBE} and Selective {HIBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/957},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingG17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingFKS17,
  author       = {Nico D{\"{o}}ttling and
                  Nils Fleischhacker and
                  Johannes Krupp and
                  Dominique Schr{\"{o}}der},
  title        = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {958},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/958},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingFKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingGHM17,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Daniel Masny},
  title        = {New Constructions of Identity-Based and Key-Dependent Message Secure
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/978},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/Dottling16,
  author       = {Nico D{\"{o}}ttling},
  title        = {Low Noise {LPN:} Key dependent message secure public key encryption
                  an sample amplification},
  journal      = {{IET} Inf. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {372--385},
  year         = {2016},
  url          = {https://doi.org/10.1049/iet-ifs.2015.0495},
  doi          = {10.1049/IET-IFS.2015.0495},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/Dottling16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CascudoDDDN16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {179--207},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_7},
  doi          = {10.1007/978-3-662-53015-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CascudoDDDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingFKS16,
  author       = {Nico D{\"{o}}ttling and
                  Nils Fleischhacker and
                  Johannes Krupp and
                  Dominique Schr{\"{o}}der},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {619--648},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_22},
  doi          = {10.1007/978-3-662-53015-3\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingFKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AggarwalDDHS16,
  author       = {Abhinav Aggarwal and
                  Varsha Dani and
                  Nico D{\"{o}}ttling and
                  Thomas P. Hayes and
                  Jared Saia},
  title        = {Secure Multiparty Interactive Communication with Unknown Noise Rate},
  journal      = {CoRR},
  volume       = {abs/1612.05943},
  year         = {2016},
  url          = {http://arxiv.org/abs/1612.05943},
  eprinttype    = {arXiv},
  eprint       = {1612.05943},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AggarwalDDHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CascudoDDDN16,
  author       = {Ignacio Cascudo and
                  Ivan Damg{\aa}rd and
                  Bernardo David and
                  Nico D{\"{o}}ttling and
                  Jesper Buus Nielsen},
  title        = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CascudoDDDN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingKMN16,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  title        = {From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {201},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/201},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingKMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDGX16,
  author       = {Ronald Cramer and
                  Ivan Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Irene Giacomelli and
                  Chaoping Xing},
  title        = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {397},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/397},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingG0MM16,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Pratyay Mukherjee},
  title        = {Obfuscation from Low Noise Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/599},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingG0MM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AponDGM16,
  author       = {Daniel Apon and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Pratyay Mukherjee},
  title        = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over
                  {GGH13}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1003},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AponDGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BroadnaxDHMN16,
  author       = {Brandon Broadnax and
                  Nico D{\"{o}}ttling and
                  Gunnar Hartung and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Matthias Nagel},
  title        = {Concurrently Composable Security With Shielded Super-polynomial Simulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1043},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BroadnaxDHMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DottlingS15,
  author       = {Nico D{\"{o}}ttling and
                  Dominique Schr{\"{o}}der},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Pseudorandom Functions via On-the-Fly Adaptation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {329--350},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_16},
  doi          = {10.1007/978-3-662-47989-6\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DottlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CramerDDFS15,
  author       = {Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Serge Fehr and
                  Gabriele Spini},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal
                  Hash Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {313--336},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_11},
  doi          = {10.1007/978-3-662-46803-6\_11},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CramerDDFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dottling15,
  author       = {Nico D{\"{o}}ttling},
  editor       = {Jonathan Katz},
  title        = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {604--626},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_27},
  doi          = {10.1007/978-3-662-46447-2\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dottling15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DottlingKMN15,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_2},
  doi          = {10.1007/978-3-319-26059-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DottlingKMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingKMN15,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {General Statistically Secure Computation with Bounded-Resettable Hardware
                  Tokens},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {319--344},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_14},
  doi          = {10.1007/978-3-662-46494-6\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingKMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dottling15,
  author       = {Nico D{\"{o}}ttling},
  title        = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dottling15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CramerDDFS15,
  author       = {Ronald Cramer and
                  Ivan Bjerre Damg{\aa}rd and
                  Nico D{\"{o}}ttling and
                  Serge Fehr and
                  Gabriele Spini},
  title        = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingS15,
  author       = {Nico D{\"{o}}ttling and
                  Dominique Schr{\"{o}}der},
  title        = {Efficient Pseudorandom Functions via On-the-Fly Adaptation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1185},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Dottling14,
  author       = {Nico Marcel D{\"{o}}ttling},
  title        = {Cryptography based on the Hardness of Decoding},
  school       = {Karlsruhe Institute of Technology},
  year         = {2014},
  url          = {http://digbib.ubka.uni-karlsruhe.de/volltexte/1000041110},
  urn          = {urn:nbn:de:swb:90-411105},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Dottling14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingKMN14,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  title        = {General Statistically Secure Computation with Bounded-Resettable Hardware
                  Tokens},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/555},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingKMN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DottlingM13,
  author       = {Nico D{\"{o}}ttling and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Lossy Codes and a New Variant of the Learning-With-Errors Problem},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {18--34},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_2},
  doi          = {10.1007/978-3-642-38348-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DottlingM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingMMN13,
  author       = {Nico D{\"{o}}ttling and
                  Thilo Mie and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  editor       = {Amit Sahai},
  title        = {Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof
                  Hardware-Tokens},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {642--661},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_36},
  doi          = {10.1007/978-3-642-36594-2\_36},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingMMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DottlingDMN12,
  author       = {Nico D{\"{o}}ttling and
                  Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  title        = {A {CCA2} Secure Variant of the McEliece Cryptosystem},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {10},
  pages        = {6672--6680},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2203582},
  doi          = {10.1109/TIT.2012.2203582},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/DottlingDMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DottlingMN12,
  author       = {Nico D{\"{o}}ttling and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {{IND-CCA} Secure Cryptography Based on a Variant of the {LPN} Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {485--503},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_30},
  doi          = {10.1007/978-3-642-34961-4\_30},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DottlingMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DottlingKM12,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Adam D. Smith},
  title        = {Statistically Secure Linear-Rate Dimension Extension for Oblivious
                  Affine Function Evaluation},
  booktitle    = {Information Theoretic Security - 6th International Conference, {ICITS}
                  2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7412},
  pages        = {111--128},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32284-6\_7},
  doi          = {10.1007/978-3-642-32284-6\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DottlingKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-5224,
  author       = {Nico D{\"{o}}ttling and
                  Rafael Dowsley and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento},
  title        = {A {CCA2} Secure Variant of the McEliece Cryptosystem},
  journal      = {CoRR},
  volume       = {abs/1205.5224},
  year         = {2012},
  url          = {http://arxiv.org/abs/1205.5224},
  eprinttype    = {arXiv},
  eprint       = {1205.5224},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1205-5224.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingKM12,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  title        = {David {\&} Goliath Oblivious Affine Function Evaluation - Asymptotically
                  Optimal Building Blocks for Universally Composable Two-Party Computation
                  from a Single Untrusted Stateful Tamper-Proof Hardware Token},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DottlingKM11,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Serge Fehr},
  title        = {Efficient Reductions for Non-signaling Cryptographic Primitives},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_12},
  doi          = {10.1007/978-3-642-20728-0\_12},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DottlingKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/DottlingKM11,
  author       = {Nico D{\"{o}}ttling and
                  Daniel Kraschewski and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Yuval Ishai},
  title        = {Unconditional and Composable Security Using a Single Stateful Tamper-Proof
                  Hardware Token},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_11},
  doi          = {10.1007/978-3-642-19571-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/DottlingKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingMMN11,
  author       = {Nico D{\"{o}}ttling and
                  Thilo Mie and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Tobias Nilges},
  title        = {Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {675},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/675},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingMMN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DottlingLMA10,
  author       = {Nico D{\"{o}}ttling and
                  Dejan E. Lazich and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Antonio Sobreira de Almeida},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {206--220},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_15},
  doi          = {10.1007/978-3-642-17955-6\_15},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DottlingLMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics