Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nico Döttling
@inproceedings{DBLP:conf/acns/AlkadriDP24, author = {Nabil Alkeilani Alkadri and Nico D{\"{o}}ttling and Sihang Pu}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Practical Lattice-Based Distributed Signatures for a Small Number of Signers}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {376--402}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_15}, doi = {10.1007/978-3-031-54770-6\_15}, timestamp = {Mon, 11 Mar 2024 15:20:49 +0100}, biburl = {https://dblp.org/rec/conf/acns/AlkadriDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrancoDS24, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan}, editor = {Marc Joye and Gregor Leander}, title = {Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {14656}, pages = {271--300}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58751-1\_10}, doi = {10.1007/978-3-031-58751-1\_10}, timestamp = {Thu, 09 May 2024 11:09:43 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrancoDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DottlingM24, author = {Nico D{\"{o}}ttling and Tamer Mour}, editor = {Venkatesan Guruswami}, title = {On the Black-Box Complexity of Correlation Intractability}, booktitle = {15th Innovations in Theoretical Computer Science Conference, {ITCS} 2024, January 30 to February 2, 2024, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {287}, pages = {40:1--40:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2024}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2024.40}, doi = {10.4230/LIPICS.ITCS.2024.40}, timestamp = {Wed, 24 Jan 2024 15:25:09 +0100}, biburl = {https://dblp.org/rec/conf/innovations/DottlingM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrancoDSZ24, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan and Riccardo Zanotto}, editor = {Qiang Tang and Vanessa Teague}, title = {Rate-1 Fully Local Somewhere Extractable Hashing from {DDH}}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14603}, pages = {356--386}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57725-3\_12}, doi = {10.1007/978-3-031-57725-3\_12}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrancoDSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrancoDSZ24, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan and Riccardo Zanotto}, title = {Rate-1 Fully Local Somewhere Extractable Hashing from {DDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2024}, url = {https://eprint.iacr.org/2024/216}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrancoDSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrancoDS24, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan}, title = {Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2024}, url = {https://eprint.iacr.org/2024/372}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrancoDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlkadriDP24, author = {Nabil Alkeilani Alkadri and Nico D{\"{o}}ttling and Sihang Pu}, title = {Practical Lattice-Based Distributed Signatures for a Small Number of Signers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {449}, year = {2024}, url = {https://eprint.iacr.org/2024/449}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlkadriDP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/AggarwalDDHMO23, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski}, title = {Algebraic Restriction Codes and Their Applications}, journal = {Algorithmica}, volume = {85}, number = {12}, pages = {3602--3648}, year = {2023}, url = {https://doi.org/10.1007/s00453-023-01150-y}, doi = {10.1007/S00453-023-01150-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/AggarwalDDHMO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BrakerskiDGM23, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, title = {Candidate iO from Homomorphic Encryption Schemes}, journal = {J. Cryptol.}, volume = {36}, number = {3}, pages = {27}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09471-5}, doi = {10.1007/S00145-023-09471-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/BrakerskiDGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PuTDH23, author = {Sihang Pu and Sri Aravinda Krishnan Thyagarajan and Nico D{\"{o}}ttling and Lucjan Hanzlik}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Post Quantum Fuzzy Stealth Signatures and Applications}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {371--385}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623148}, doi = {10.1145/3576915.3623148}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PuTDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrancoDS23, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {A Framework for Statistically Sender Private {OT} with Optimal Rate}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {548--576}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_18}, doi = {10.1007/978-3-031-38557-5\_18}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrancoDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingKLLMR23, author = {Nico D{\"{o}}ttling and Dimitris Kolonelos and Russell W. F. Lai and Chuanwei Lin and Giulio Malavolta and Ahmadreza Rahimi}, editor = {Carmit Hazay and Martijn Stam}, title = {Efficient Laconic Cryptography from Learning with Errors}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {417--446}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_14}, doi = {10.1007/978-3-031-30620-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingKLLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DottlingHMW23, author = {Nico D{\"{o}}ttling and Lucjan Hanzlik and Bernardo Magri and Stella Wohnig}, editor = {Foteini Baldimtsi and Christian Cachin}, title = {McFly: Verifiable Encryption to the Future Made Practical}, booktitle = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13950}, pages = {252--269}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47754-6\_15}, doi = {10.1007/978-3-031-47754-6\_15}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/DottlingHMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingGM23, author = {Nico D{\"{o}}ttling and Phillip Gajland and Giulio Malavolta}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Laconic Function Evaluation for Turing Machines}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {606--634}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_21}, doi = {10.1007/978-3-031-31371-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/DottlingGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingKLLMR23, author = {Nico D{\"{o}}ttling and Dimitris Kolonelos and Russell W. F. Lai and Chuanwei Lin and Giulio Malavolta and Ahmadreza Rahimi}, title = {Efficient Laconic Cryptography from Learning With Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2023}, url = {https://eprint.iacr.org/2023/404}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingKLLMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGM23, author = {Nico D{\"{o}}ttling and Phillip Gajland and Giulio Malavolta}, title = {Laconic Function Evaluation for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {502}, year = {2023}, url = {https://eprint.iacr.org/2023/502}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0005DS23, author = {Pedro Branco and Nico D{\"{o}}ttling and Akshayaram Srinivasan}, title = {A Framework for Statistically Sender Private {OT} with Optimal Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2023}, url = {https://eprint.iacr.org/2023/1011}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0005DS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PuTDH23, author = {Sihang Pu and Sri Aravinda Krishnan Thyagarajan and Nico D{\"{o}}ttling and Lucjan Hanzlik}, title = {Post Quantum Fuzzy Stealth Signatures and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1148}, year = {2023}, url = {https://eprint.iacr.org/2023/1148}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PuTDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingM23, author = {Nico D{\"{o}}ttling and Tamer Mour}, title = {On The Black-Box Complexity of Correlation Intractability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1365}, year = {2023}, url = {https://eprint.iacr.org/2023/1365}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BrancoDW22, author = {Pedro Branco and Nico D{\"{o}}ttling and Stella Wohnig}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Universal Ring Signatures in the Standard Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {249--278}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_9}, doi = {10.1007/978-3-031-22972-5\_9}, timestamp = {Fri, 03 Feb 2023 17:07:15 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BrancoDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/DottlingD22, author = {Nico D{\"{o}}ttling and Jesko Dujmovic}, editor = {Dana Dachman{-}Soled}, title = {Maliciously Circuit-Private {FHE} from Information-Theoretic Principles}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {4:1--4:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.4}, doi = {10.4230/LIPICS.ITC.2022.4}, timestamp = {Thu, 30 Jun 2022 16:13:48 +0200}, biburl = {https://dblp.org/rec/conf/citc/DottlingD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiBDP22, author = {Zvika Brakerski and Pedro Branco and Nico D{\"{o}}ttling and Sihang Pu}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Batch-OT with Optimal Rate}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {157--186}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_6}, doi = {10.1007/978-3-031-07085-3\_6}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiBDP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BrakerskiDGM22, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, editor = {Mikolaj Bojanczyk and Emanuela Merelli and David P. Woodruff}, title = {Factoring and Pairings Are Not Necessary for {IO:} Circular-Secure {LWE} Suffices}, booktitle = {49th International Colloquium on Automata, Languages, and Programming, {ICALP} 2022, July 4-8, 2022, Paris, France}, series = {LIPIcs}, volume = {229}, pages = {28:1--28:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2022.28}, doi = {10.4230/LIPICS.ICALP.2022.28}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/BrakerskiDGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/AggarwalDDHMO22, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski}, editor = {Mark Braverman}, title = {Algebraic Restriction Codes and Their Applications}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {2:1--2:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.2}, doi = {10.4230/LIPICS.ITCS.2022.2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/AggarwalDDHMO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/DottlingGMR22, author = {Nico D{\"{o}}ttling and Vipul Goyal and Giulio Malavolta and Justin Raizes}, editor = {Mark Braverman}, title = {Interaction-Preserving Compilers for Secure Computation}, booktitle = {13th Innovations in Theoretical Computer Science Conference, {ITCS} 2022, January 31 - February 3, 2022, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {215}, pages = {57:1--57:18}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2022.57}, doi = {10.4230/LIPICS.ITCS.2022.57}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/DottlingGMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0005DM22, author = {Pedro Branco and Nico D{\"{o}}ttling and Paulo Mateus}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Two-Round Oblivious Linear Evaluation from Learning with Errors}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13177}, pages = {379--408}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97121-2\_14}, doi = {10.1007/978-3-030-97121-2\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0005DM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrancoDD22, author = {Pedro Branco and Nico D{\"{o}}ttling and Jesko Dujmovic}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Rate-1 Incompressible Encryption from Standard Assumptions}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {33--69}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_2}, doi = {10.1007/978-3-031-22365-5\_2}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrancoDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingGSW22, author = {Nico D{\"{o}}ttling and Sanjam Garg and Sruthi Sekar and Mingyuan Wang}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {{IBE} with Incompressible Master Secret and Small Identity Secrets}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {588--617}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_21}, doi = {10.1007/978-3-031-22318-1\_21}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DottlingGSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiBDP22, author = {Zvika Brakerski and Pedro Branco and Nico D{\"{o}}ttling and Sihang Pu}, title = {Batch-OT with Optimal Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {314}, year = {2022}, url = {https://eprint.iacr.org/2022/314}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiBDP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingHMW22, author = {Nico D{\"{o}}ttling and Lucjan Hanzlik and Bernardo Magri and Stella Wohnig}, title = {McFly: Verifiable Encryption to the Future Made Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2022}, url = {https://eprint.iacr.org/2022/433}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingHMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingD22, author = {Nico D{\"{o}}ttling and Jesko Dujmovic}, title = {Maliciously Circuit-Private {FHE} from Information-Theoretic Principles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2022}, url = {https://eprint.iacr.org/2022/495}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGSW22, author = {Nico D{\"{o}}ttling and Sanjam Garg and Sruthi Sekar and Mingyuan Wang}, title = {{IBE} with Incompressible Master Secret and Small Identity Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2022}, url = {https://eprint.iacr.org/2022/649}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrancoDD22, author = {Pedro Branco and Nico D{\"{o}}ttling and Jesko Dujmovic}, title = {Rate-1 Incompressible Encryption from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2022}, url = {https://eprint.iacr.org/2022/697}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrancoDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrancoDW22, author = {Pedro Branco and Nico D{\"{o}}ttling and Stella Wohnig}, title = {Universal Ring Signatures in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1265}, year = {2022}, url = {https://eprint.iacr.org/2022/1265}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrancoDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/DottlingG21, author = {Nico D{\"{o}}ttling and Sanjam Garg}, title = {Identity-based Encryption from the Diffie-Hellman Assumption}, journal = {J. {ACM}}, volume = {68}, number = {3}, pages = {14:1--14:46}, year = {2021}, url = {https://doi.org/10.1145/3422370}, doi = {10.1145/3422370}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/DottlingG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0005DP21, author = {Pedro Branco and Nico D{\"{o}}ttling and Sihang Pu}, editor = {Juan A. Garay}, title = {Multiparty Cardinality Testing for Threshold Private Intersection}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {32--60}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_2}, doi = {10.1007/978-3-030-75248-4\_2}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0005DP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingN21, author = {Nico D{\"{o}}ttling and Ryo Nishimaki}, editor = {Juan A. Garay}, title = {Universal Proxy Re-Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {512--542}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_19}, doi = {10.1007/978-3-030-75245-3\_19}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DottlingN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Alamati0DGHP21, author = {Navid Alamati and Pedro Branco and Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu}, editor = {Kobbi Nissim and Brent Waters}, title = {Laconic Private Set Intersection and Applications}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {94--125}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_4}, doi = {10.1007/978-3-030-90456-2\_4}, timestamp = {Mon, 08 Nov 2021 11:51:39 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Alamati0DGHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChardouvelisDM21, author = {Orestis Chardouvelis and Nico D{\"{o}}ttling and Giulio Malavolta}, editor = {Kobbi Nissim and Brent Waters}, title = {Rate-1 Quantum Fully Homomorphic Encryption}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {149--176}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_6}, doi = {10.1007/978-3-030-90459-3\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ChardouvelisDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingHHKSU21, author = {Nico D{\"{o}}ttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Sch{\"{a}}ge and Bogdan Ursu}, editor = {Kobbi Nissim and Brent Waters}, title = {On the Impossibility of Purely Algebraic Signatures}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, pages = {317--349}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2\_11}, doi = {10.1007/978-3-030-90456-2\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/DottlingHHKSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlamatiBDGHP21, author = {Navid Alamati and Pedro Branco and Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu}, title = {Laconic Private Set Intersection and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {728}, year = {2021}, url = {https://eprint.iacr.org/2021/728}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlamatiBDGHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingHHKSU21, author = {Nico D{\"{o}}ttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Sch{\"{a}}ge and Bogdan Ursu}, title = {On the Impossibility of Short Algebraic Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2021}, url = {https://eprint.iacr.org/2021/738}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingHHKSU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDDHMO21, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesko Dujmovic and Mohammad Hajiabadi and Giulio Malavolta and Maciej Obremski}, title = {Algebraic Restriction Codes and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2021}, url = {https://eprint.iacr.org/2021/1177}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDDHMO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGMR21, author = {Nico D{\"{o}}ttling and Vipul Goyal and Giulio Malavolta and Justin Raizes}, title = {Interaction-Preserving Compilers for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1503}, year = {2021}, url = {https://eprint.iacr.org/2021/1503}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DeuberDMMT20, author = {Dominic Deuber and Nico D{\"{o}}ttling and Bernardo Magri and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Minting Mechanism for Proof of Stake Blockchains}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {315--334}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_16}, doi = {10.1007/978-3-030-57808-4\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DeuberDMMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DottlingMP20, author = {Nico D{\"{o}}ttling and Giulio Malavolta and Sihang Pu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {A Combinatorial Approach to Quantum Random Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {614--632}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_21}, doi = {10.1007/978-3-030-64834-3\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DottlingMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ThyagarajanBMDK20, author = {Sri Aravinda Krishnan Thyagarajan and Adithya Bhat and Giulio Malavolta and Nico D{\"{o}}ttling and Aniket Kate and Dominique Schr{\"{o}}der}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Verifiable Timed Signatures Made Practical}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1733--1750}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417263}, doi = {10.1145/3372297.3417263}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ThyagarajanBMDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiDGM20, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, editor = {Anne Canteaut and Yuval Ishai}, title = {Candidate iO from Homomorphic Encryption Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {79--109}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_4}, doi = {10.1007/978-3-030-45721-1\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiDGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrakerskiD20, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, editor = {Anne Canteaut and Yuval Ishai}, title = {Hardness of {LWE} on General Entropic Distributions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {551--575}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_19}, doi = {10.1007/978-3-030-45724-2\_19}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrakerskiD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingGHMW20, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs}, editor = {Anne Canteaut and Yuval Ishai}, title = {Two-Round Oblivious Transfer from {CDH} or {LPN}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {768--797}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_26}, doi = {10.1007/978-3-030-45724-2\_26}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingGHMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DottlingGMV20, author = {Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta and Prashant Nalini Vasudevan}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {Tight Verifiable Delay Functions}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {65--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_4}, doi = {10.1007/978-3-030-57990-6\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/DottlingGMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiD20, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Lossiness and Entropic Hardness for Ring-LWE}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {1--27}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_1}, doi = {10.1007/978-3-030-64375-1\_1}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Brakerski0DGM20, author = {Zvika Brakerski and Pedro Branco and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {58--87}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_3}, doi = {10.1007/978-3-030-64375-1\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Brakerski0DGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-06993, author = {Nico D{\"{o}}ttling and Kathrin Grosse and Michael Backes and Ian M. Molloy}, title = {Adversarial Examples and Metrics}, journal = {CoRR}, volume = {abs/2007.06993}, year = {2020}, url = {https://arxiv.org/abs/2007.06993}, eprinttype = {arXiv}, eprint = {2007.06993}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-06993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiD20, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, title = {Hardness of {LWE} on General Entropic Distributions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2020}, url = {https://eprint.iacr.org/2020/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiDGM20, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, title = {Candidate iO from Homomorphic Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2020}, url = {https://eprint.iacr.org/2020/394}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiDGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrancoDM20, author = {Pedro Branco and Nico D{\"{o}}ttling and Paulo Mateus}, title = {Two-Round Oblivious Linear Evaluation from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2020}, url = {https://eprint.iacr.org/2020/635}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrancoDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiDGM20a, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, title = {Factoring and Pairings are not Necessary for iO: Circular-Secure {LWE} Suffices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1024}, year = {2020}, url = {https://eprint.iacr.org/2020/1024}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiDGM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiD20a, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, title = {Lossiness and Entropic Hardness for Ring-LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1185}, year = {2020}, url = {https://eprint.iacr.org/2020/1185}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiD20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiBDGM20, author = {Zvika Brakerski and Pedro Branco and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, title = {Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1186}, year = {2020}, url = {https://eprint.iacr.org/2020/1186}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiBDGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrancoDP20, author = {Pedro Branco and Nico D{\"{o}}ttling and Sihang Pu}, title = {Multiparty Cardinality Testing for Threshold Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1307}, year = {2020}, url = {https://eprint.iacr.org/2020/1307}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BrancoDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingMP20, author = {Nico D{\"{o}}ttling and Giulio Malavolta and Sihang Pu}, title = {A Combinatorial Approach to Quantum Random Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1508}, year = {2020}, url = {https://eprint.iacr.org/2020/1508}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DottlingMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ThyagarajanBMDK20, author = {Sri Aravinda Krishnan Thyagarajan and Adithya Bhat and Giulio Malavolta and Nico D{\"{o}}ttling and Aniket Kate and Dominique Schr{\"{o}}der}, title = {Verifiable Timed Signatures Made Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1563}, year = {2020}, url = {https://eprint.iacr.org/2020/1563}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ThyagarajanBMDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DottlingGHLM19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {585--606}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_20}, doi = {10.1007/978-3-030-34618-8\_20}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DottlingGHLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CascudoDDDDG19, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Rafael Dowsley and Irene Giacomelli}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Efficient {UC} Commitment Extension with Homomorphism for Free (and Applications)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {606--635}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_22}, doi = {10.1007/978-3-030-34621-8\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/CascudoDDDDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingGIMMO19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Trapdoor Hash Functions and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {3--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_1}, doi = {10.1007/978-3-030-26954-8\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DottlingGIMMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/0001DHKS19, author = {Michael Backes and Nico D{\"{o}}ttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {281--311}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_10}, doi = {10.1007/978-3-030-17659-4\_10}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/0001DHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingLM19, author = {Nico D{\"{o}}ttling and Russell W. F. Lai and Giulio Malavolta}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Incremental Proofs of Sequential Work}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {292--323}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_11}, doi = {10.1007/978-3-030-17656-3\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AggarwalDNOP19, author = {Divesh Aggarwal and Nico D{\"{o}}ttling and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Continuous Non-Malleable Codes in the 8-Split-State Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {531--561}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_18}, doi = {10.1007/978-3-030-17653-2\_18}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AggarwalDNOP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DottlingGGM19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Vipul Goyal and Giulio Malavolta}, editor = {David Zuckerman}, title = {Laconic Conditional Disclosure of Secrets and Applications}, booktitle = {60th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2019, Baltimore, Maryland, USA, November 9-12, 2019}, pages = {661--685}, publisher = {{IEEE} Computer Society}, year = {2019}, url = {https://doi.org/10.1109/FOCS.2019.00046}, doi = {10.1109/FOCS.2019.00046}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DottlingGGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiDGM19, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {407--437}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_16}, doi = {10.1007/978-3-030-36033-7\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiDGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BackesDHKS19, author = {Michael Backes and Nico D{\"{o}}ttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, title = {Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2019}, url = {https://eprint.iacr.org/2019/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BackesDHKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHMW19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs}, title = {Two-Round Oblivious Transfer from {CDH} or {LPN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2019}, url = {https://eprint.iacr.org/2019/414}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGIMMO19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky}, title = {Trapdoor Hash Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2019}, url = {https://eprint.iacr.org/2019/639}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGIMMO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingLM19, author = {Nico D{\"{o}}ttling and Russell W. F. Lai and Giulio Malavolta}, title = {Incremental Proofs of Sequential Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2019}, url = {https://eprint.iacr.org/2019/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGMV19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta and Prashant Nalini Vasudevan}, title = {Tight Verifiable Delay Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {659}, year = {2019}, url = {https://eprint.iacr.org/2019/659}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiDGM19, author = {Zvika Brakerski and Nico D{\"{o}}ttling and Sanjam Garg and Giulio Malavolta}, title = {Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2019}, url = {https://eprint.iacr.org/2019/720}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiDGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHLM19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta}, title = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1072}, year = {2019}, url = {https://eprint.iacr.org/2019/1072}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGGM19, author = {Nico D{\"{o}}ttling and Sanjam Garg and Vipul Goyal and Giulio Malavolta}, title = {Laconic Conditional Disclosure of Secrets and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1353}, year = {2019}, url = {https://eprint.iacr.org/2019/1353}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DottlingG0MM18, author = {Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, editor = {Debrup Chakraborty and Tetsu Iwata}, title = {Obfuscation from Low Noise Multilinear Maps}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11356}, pages = {329--352}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05378-9\_18}, doi = {10.1007/978-3-030-05378-9\_18}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DottlingG0MM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingGHM18, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, editor = {Michel Abdalla and Ricardo Dahab}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {3--31}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_1}, doi = {10.1007/978-3-319-76578-5\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DottlingGHM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BrakerskiD18, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Two-Message Statistically Sender-Private {OT} from {LWE}}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {370--390}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_14}, doi = {10.1007/978-3-030-03810-6\_14}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BrakerskiD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiD18, author = {Zvika Brakerski and Nico D{\"{o}}ttling}, title = {Two-Message Statistical Sender-Private {OT} from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2018}, url = {https://eprint.iacr.org/2018/530}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingN18, author = {Nico D{\"{o}}ttling and Ryo Nishimaki}, title = {Universal Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2018}, url = {https://eprint.iacr.org/2018/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDDDDG18, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Rafael Dowsley and Irene Giacomelli}, title = {Efficient {UC} Commitment Extension with Homomorphism for Free (and Applications)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {983}, year = {2018}, url = {https://eprint.iacr.org/2018/983}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDDDDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeuberDMMT18, author = {Dominic Deuber and Nico D{\"{o}}ttling and Bernardo Magri and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan}, title = {Minting Mechanisms for Blockchain - or - Moving from Cryptoassets to Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1110}, year = {2018}, url = {https://eprint.iacr.org/2018/1110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeuberDMMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DottlingGNNT17, author = {Nico D{\"{o}}ttling and Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges and Roberto Trifiletti}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2263--2276}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134024}, doi = {10.1145/3133956.3134024}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DottlingGNNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoDG0MP17, author = {Chongwon Cho and Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou}, editor = {Jonathan Katz and Hovav Shacham}, title = {Laconic Oblivious Transfer and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {33--65}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_2}, doi = {10.1007/978-3-319-63715-0\_2}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoDG0MP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingG17, author = {Nico D{\"{o}}ttling and Sanjam Garg}, editor = {Jonathan Katz and Hovav Shacham}, title = {Identity-Based Encryption from the Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {537--569}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_18}, doi = {10.1007/978-3-319-63688-7\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DottlingG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BroadnaxDHMN17, author = {Brandon Broadnax and Nico D{\"{o}}ttling and Gunnar Hartung and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Nagel}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Concurrently Composable Security with Shielded Super-Polynomial Simulators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {351--381}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_13}, doi = {10.1007/978-3-319-56620-7\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BroadnaxDHMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AponDGM17, author = {Daniel Apon and Nico D{\"{o}}ttling and Sanjam Garg and Pratyay Mukherjee}, editor = {Ioannis Chatzigiannakis and Piotr Indyk and Fabian Kuhn and Anca Muscholl}, title = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over {GGH13}}, booktitle = {44th International Colloquium on Automata, Languages, and Programming, {ICALP} 2017, July 10-14, 2017, Warsaw, Poland}, series = {LIPIcs}, volume = {80}, pages = {38:1--38:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2017.38}, doi = {10.4230/LIPICS.ICALP.2017.38}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AponDGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/CramerDDGX17, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, editor = {Junji Shikata}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {1--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_1}, doi = {10.1007/978-3-319-72089-0\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/CramerDDGX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingG17, author = {Nico D{\"{o}}ttling and Sanjam Garg}, editor = {Yael Kalai and Leonid Reyzin}, title = {From Selective {IBE} to Full {IBE} and Selective {HIBE}}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {372--408}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_13}, doi = {10.1007/978-3-319-70500-2\_13}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DottlingG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/DottlingNO17, author = {Nico D{\"{o}}ttling and Jesper Buus Nielsen and Maciej Obremski}, title = {Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-078}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/078}, eprinttype = {ECCC}, eprint = {TR17-078}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/DottlingNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingNO17, author = {Nico D{\"{o}}ttling and Jesper Buus Nielsen and Maciej Obremski}, title = {Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2017}, url = {http://eprint.iacr.org/2017/357}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingNO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoDG0MP17, author = {Chongwon Cho and Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou}, title = {Laconic Oblivious Transfer and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2017}, url = {http://eprint.iacr.org/2017/491}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoDG0MP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG17, author = {Nico D{\"{o}}ttling and Sanjam Garg}, title = {Identity-Based Encryption from the Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2017}, url = {http://eprint.iacr.org/2017/543}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGNNT17, author = {Nico D{\"{o}}ttling and Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges and Roberto Trifiletti}, title = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {790}, year = {2017}, url = {http://eprint.iacr.org/2017/790}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGNNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG17a, author = {Nico D{\"{o}}ttling and Sanjam Garg}, title = {From Selective {IBE} to Full {IBE} and Selective {HIBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2017}, url = {http://eprint.iacr.org/2017/957}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingFKS17, author = {Nico D{\"{o}}ttling and Nils Fleischhacker and Johannes Krupp and Dominique Schr{\"{o}}der}, title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {958}, year = {2017}, url = {http://eprint.iacr.org/2017/958}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingFKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingGHM17, author = {Nico D{\"{o}}ttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2017}, url = {http://eprint.iacr.org/2017/978}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingGHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Dottling16, author = {Nico D{\"{o}}ttling}, title = {Low Noise {LPN:} Key dependent message secure public key encryption an sample amplification}, journal = {{IET} Inf. Secur.}, volume = {10}, number = {6}, pages = {372--385}, year = {2016}, url = {https://doi.org/10.1049/iet-ifs.2015.0495}, doi = {10.1049/IET-IFS.2015.0495}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/Dottling16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CascudoDDDN16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Jesper Buus Nielsen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {179--207}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_7}, doi = {10.1007/978-3-662-53015-3\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CascudoDDDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingFKS16, author = {Nico D{\"{o}}ttling and Nils Fleischhacker and Johannes Krupp and Dominique Schr{\"{o}}der}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {619--648}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_22}, doi = {10.1007/978-3-662-53015-3\_22}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DottlingFKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AggarwalDDHS16, author = {Abhinav Aggarwal and Varsha Dani and Nico D{\"{o}}ttling and Thomas P. Hayes and Jared Saia}, title = {Secure Multiparty Interactive Communication with Unknown Noise Rate}, journal = {CoRR}, volume = {abs/1612.05943}, year = {2016}, url = {http://arxiv.org/abs/1612.05943}, eprinttype = {arXiv}, eprint = {1612.05943}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AggarwalDDHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CascudoDDDN16, author = {Ignacio Cascudo and Ivan Damg{\aa}rd and Bernardo David and Nico D{\"{o}}ttling and Jesper Buus Nielsen}, title = {Rate-1, Linear Time and Additively Homomorphic {UC} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2016}, url = {http://eprint.iacr.org/2016/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CascudoDDDN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingKMN16, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, title = {From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {201}, year = {2016}, url = {http://eprint.iacr.org/2016/201}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingKMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDGX16, author = {Ronald Cramer and Ivan Damg{\aa}rd and Nico D{\"{o}}ttling and Irene Giacomelli and Chaoping Xing}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {397}, year = {2016}, url = {http://eprint.iacr.org/2016/397}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDGX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG0MM16, author = {Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, title = {Obfuscation from Low Noise Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2016}, url = {http://eprint.iacr.org/2016/599}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG0MM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponDGM16, author = {Daniel Apon and Nico D{\"{o}}ttling and Sanjam Garg and Pratyay Mukherjee}, title = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over {GGH13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2016}, url = {http://eprint.iacr.org/2016/1003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponDGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BroadnaxDHMN16, author = {Brandon Broadnax and Nico D{\"{o}}ttling and Gunnar Hartung and J{\"{o}}rn M{\"{u}}ller{-}Quade and Matthias Nagel}, title = {Concurrently Composable Security With Shielded Super-polynomial Simulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1043}, year = {2016}, url = {http://eprint.iacr.org/2016/1043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BroadnaxDHMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DottlingS15, author = {Nico D{\"{o}}ttling and Dominique Schr{\"{o}}der}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {329--350}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_16}, doi = {10.1007/978-3-662-47989-6\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DottlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {313--336}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_11}, doi = {10.1007/978-3-662-46803-6\_11}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dottling15, author = {Nico D{\"{o}}ttling}, editor = {Jonathan Katz}, title = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {604--626}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_27}, doi = {10.1007/978-3-662-46447-2\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dottling15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DottlingKMN15, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, editor = {Man Ho Au and Atsuko Miyaji}, title = {From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {23--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_2}, doi = {10.1007/978-3-319-26059-4\_2}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DottlingKMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingKMN15, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {General Statistically Secure Computation with Bounded-Resettable Hardware Tokens}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {319--344}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_14}, doi = {10.1007/978-3-662-46494-6\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DottlingKMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dottling15, author = {Nico D{\"{o}}ttling}, title = {Low Noise {LPN:} {KDM} Secure Public Key Encryption and Sample Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2015}, url = {http://eprint.iacr.org/2015/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dottling15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CramerDDFS15, author = {Ronald Cramer and Ivan Bjerre Damg{\aa}rd and Nico D{\"{o}}ttling and Serge Fehr and Gabriele Spini}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2015}, url = {http://eprint.iacr.org/2015/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CramerDDFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingS15, author = {Nico D{\"{o}}ttling and Dominique Schr{\"{o}}der}, title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1185}, year = {2015}, url = {http://eprint.iacr.org/2015/1185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Dottling14, author = {Nico Marcel D{\"{o}}ttling}, title = {Cryptography based on the Hardness of Decoding}, school = {Karlsruhe Institute of Technology}, year = {2014}, url = {http://digbib.ubka.uni-karlsruhe.de/volltexte/1000041110}, urn = {urn:nbn:de:swb:90-411105}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Dottling14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingKMN14, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, title = {General Statistically Secure Computation with Bounded-Resettable Hardware Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2014}, url = {http://eprint.iacr.org/2014/555}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingKMN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DottlingM13, author = {Nico D{\"{o}}ttling and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Lossy Codes and a New Variant of the Learning-With-Errors Problem}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {18--34}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_2}, doi = {10.1007/978-3-642-38348-9\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DottlingM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingMMN13, author = {Nico D{\"{o}}ttling and Thilo Mie and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, editor = {Amit Sahai}, title = {Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {642--661}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_36}, doi = {10.1007/978-3-642-36594-2\_36}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DottlingMMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DottlingDMN12, author = {Nico D{\"{o}}ttling and Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {A {CCA2} Secure Variant of the McEliece Cryptosystem}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {10}, pages = {6672--6680}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2203582}, doi = {10.1109/TIT.2012.2203582}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DottlingDMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DottlingMN12, author = {Nico D{\"{o}}ttling and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, editor = {Xiaoyun Wang and Kazue Sako}, title = {{IND-CCA} Secure Cryptography Based on a Variant of the {LPN} Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {485--503}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_30}, doi = {10.1007/978-3-642-34961-4\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DottlingMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DottlingKM12, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Adam D. Smith}, title = {Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {111--128}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_7}, doi = {10.1007/978-3-642-32284-6\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DottlingKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1205-5224, author = {Nico D{\"{o}}ttling and Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {A {CCA2} Secure Variant of the McEliece Cryptosystem}, journal = {CoRR}, volume = {abs/1205.5224}, year = {2012}, url = {http://arxiv.org/abs/1205.5224}, eprinttype = {arXiv}, eprint = {1205.5224}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-5224.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingKM12, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, title = {David {\&} Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2012}, url = {http://eprint.iacr.org/2012/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DottlingKM11, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Serge Fehr}, title = {Efficient Reductions for Non-signaling Cryptographic Primitives}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {120--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_12}, doi = {10.1007/978-3-642-20728-0\_12}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DottlingKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DottlingKM11, author = {Nico D{\"{o}}ttling and Daniel Kraschewski and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Yuval Ishai}, title = {Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {164--181}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_11}, doi = {10.1007/978-3-642-19571-6\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DottlingKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingMMN11, author = {Nico D{\"{o}}ttling and Thilo Mie and J{\"{o}}rn M{\"{u}}ller{-}Quade and Tobias Nilges}, title = {Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {675}, year = {2011}, url = {http://eprint.iacr.org/2011/675}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingMMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DottlingLMA10, author = {Nico D{\"{o}}ttling and Dejan E. Lazich and J{\"{o}}rn M{\"{u}}ller{-}Quade and Antonio Sobreira de Almeida}, editor = {Yongwha Chung and Moti Yung}, title = {Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {206--220}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_15}, doi = {10.1007/978-3-642-17955-6\_15}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DottlingLMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.