Number of items: 57.
Conference or Workshop Item (A Paper)
Döttling, Nico and Garg, Sanjam and Wang, Mingyuan
(2022)
IBE with Incompressible Master Secret and Small Identity Secrets.
Branco, Pedro and Döttling, Nico and Dujmovic, Jesko
(2022)
Rate-1 Incompressible Encryption from Standard Assumptions.
Branco, Pedro and Döttling, Nico and Wohnig, Stella
(2022)
Universal Ring Signatures in the Standard Model.
Döttling, Nico and Dujmovic, Jesko
(2022)
Maliciously Circuit-Private FHE from Information-Theoretic Principles.
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2022)
Factoring and Pairings Are Not Necessary for IO:
Circular-Secure LWE Suffices.
Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Pu, Sihang
(2022)
Batch-OT with Optimal Rate.
Branco, Pedro and Döttling, Nico and Mateus, Paulo
(2022)
Two-Round Oblivious Linear Evaluation from Learning with Errors.
Aggarwal, Divesh and Döttling, Nico and Dujmovic, Jesko and Hajiabadi, Mohammad and Malavolta, Giulio and Obremski, Maciej
(2022)
Algebraic Restriction Codes and their Applications.
Döttling, Nico and Goyal, Vipul and Malavolta, Giulio and Raizes, Justin
(2022)
Interaction-Preserving Compilers for Secure Computation.
Alamati, Navid and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Pu, Sihang
(2021)
Laconic Private Set Intersection and Applications.
Döttling, Nico and Hartmann, Dominik and Hofheinz, Dennis and Kiltz, Eike and Schäge, Sven and Ursu, Bogdan
(2021)
On the Impossibility of Purely Algebraic Signatures.
Chardouvelis, Orestis and Döttling, Nico and Malavolta, Giulio
(2021)
Rate-1 Quantum Fully Homomorphic Encryption.
Branco, Pedro and Döttling, Nico and Pu, Sihang
(2021)
Multiparty Cardinality Testing for Threshold Private Intersection.
Döttling, Nico and Nishimaki, Ryo
(2021)
Universal Proxy Re-Encryption.
Brakerski, Zvika and Branco, Pedro and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020)
Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
Brakerski, Zvika and Döttling, Nico
(2020)
Lossiness and Entropic Hardness for Ring-LWE.
Döttling, Nico and Malavolta, Giulio and Pu, Sihang
(2020)
A Combinatorial Approach to Quantum Random Functions.
Deuber, Dominic and Döttling, Nico and Magri, Bernardo and Malavolta, Giulio and Thyagarajan, Sri Aravinda Krishnan
(2020)
Minting Mechanisms for (PoS) Blockchains.
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2020)
Candidate iO from Homomorphic Encryption Schemes.
(In Press)
Brakerski, Zvika and Döttling, Nico
(2020)
Hardness of LWE on General Entropic Distribution.
Döttling, Nico and Garg, Sanjam and Malavolta, Giulio and Vasudevan, Prashant Nalini
(2020)
Tight Verifiable Delay Functions.
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel and Wichs, Daniel
(2020)
Two-Round Oblivious Transfer from CDH or LPN.
(In Press)
Döttling, Nico and Garg, Sanjam and Goyal, Vipul and Malavolta, Giulio
(2019)
Laconic Conditional Disclosure of Secrets and Applications.
(In Press)
Döttling, Nico and Garg, Sanjam and Ishai, Yuval and Malavolta, Giulio and Mour, Tamer and Ostrovsky, Rafail
(2019)
Trapdoor Hash Functions and Their Applications.
Aggarwal, Divesh and Döttling, Nico and Nielsen, Jesper Buus and Obremski, Maciej and Purwanto, Erick
(2019)
Continuous Non-Malleable Codes in the 8-Split-State Model.
Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Dowsley, Rafael and Giacomelli, Irene
(2019)
Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
(In Press)
Döttling, Nico and Lai, Russell and Malavolta, Giulio
(2019)
Incremental Proofs of Sequential Work.
(Unpublished)
Brakerski, Zvika and Döttling, Nico and Garg, Sanjam and Malavolta, Giulio
(2019)
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
(In Press)
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Liu, Kevin and Malavolta, Giulio
(2019)
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
(In Press)
Backes, Michael and Döttling, Nico and Hanzlik, Lucjan and Kluczniak, Kamil and Schneider, Jonas
(2019)
Ring Signatures: Logarithmic Size, No Setup -- from Standard Assumptions.
Döttling, Nico and Garg, Sanjam and Hajiabadi, Mohammad and Masny, Daniel
(2018)
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Mukherjee, Pratyay
(2018)
Obfuscation from Low Noise Multilinear Maps.
Brakerski, Zvika and Döttling, Nico
(2018)
Two-Message Statistically Sender-Private OT from LWE.
Broadnax, Brandon and Döttling, Nico and Hartung, Gunnar and Müller-Quade, Jörn and Nagel, Matthias
(2017)
Concurrently Composable Security with Shielded Super-Polynomial Simulators.
Apon, Daniel and Döttling, Nico and Garg, Sanjam and Mukherjee, Pratyay
(2017)
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13.
Döttling, Nico and Garg, Sanjam
(2017)
From Selective IBE to Full IBE and Selective HIBE.
Döttling, Nico and Garg, Sanjam
(2017)
Identity-Based Encryption from the Diffie-Hellman Assumption.
Cho, Chongwon and Döttling, Nico and Garg, Sanjam and Gupta, Divya and Miao, Peihan and Polychroniadou, Antigoni
(2017)
Laconic Oblivious Transfer and Its Applications.
Döttling, Nico and Ghosh, Satrajit and Nielsen, Jesper Buus and Nilges, Tobias and Trifiletti, Roberto
(2017)
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016)
Two Message Oblivious Evaluation of Cryptographic Functionalities.
Cascudo, Ignacio and Damgård, Ivan and David, Bernardo and Döttling, Nico and Nielsen, Jesper Buus
(2016)
Rate-1, Linear Time and Additively Homomorphic UC Commitments.
Döttling, Nico and Fleischhacker, Nils and Krupp, Johannes and Schröder, Dominique
(2016)
Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
Schröder, Dominique and Döttling, Nico
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
Döttling, Nico and Schröder, Dominique
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn and Nilges, Tobias
(2015)
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
Kraschewski, Daniel and Nilges, Tobias and Döttling, Nico and Müller-Quade, Jörn
(2015)
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
Cramer, Ronald and Damgård, Ivan Bjerre and Döttling, Nico and Fehr, Serge and Spini, Gabriele
(2015)
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Döttling, Nico
(2015)
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
Döttling, Nico and Nilges, Tobias and Mie, Thilo and Müller-Quade, Jörn
(2013)
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Döttling, Nico and Müller-Quade, Jörn
(2013)
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Döttling, Nico and Nascimento, Anderson C. A. and Müller-Quade, Jörn
(2012)
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2012)
Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011)
Efficient Reductions for Non-signaling Cryptographic Primitives.
Döttling, Nico and Kraschewski, Daniel and Müller-Quade, Jörn
(2011)
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Döttling, Nico and de Almeida, Antonio Sobreira and Lazich, Dejan E. and Müller-Quade, Jörn
(2010)
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
Article
Döttling, Nico and Garg, Sanjam
(2021)
Identity-based Encryption from the Diffie-Hellman Assumption.
Journal of the ACM.
ISSN 0004-5411
Döttling, Nico and Dowsley, Rafael and Müller-Quade, Jörn and Nascimento, Anderson C. A.
(2012)
A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Information Theory, 58 (10).
pp. 6672-6680.
This list was generated on Thu Nov 21 13:17:58 2024 CET.