David Derler
David Derler
DFINITY
Verified email at dfinity.org - Homepage
Title
Cited by
Cited by
Year
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
CCS'17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and …, 2017
1172017
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
D Derler, C Hanser, D Slamanig
Cryptographers’ Track at the RSA Conference, 127-144, 2015
632015
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
IACR International Conference on Practice and Theory of Public-Key …, 2017
42*2017
A General Framework for Redactable Signatures and New Constructions
D Derler, HC Pöhls, K Samelin, D Slamanig
International Conference on Information Security and Cryptology, 3-19, 2015
332015
Highly-efficient fully-anonymous dynamic group signatures
D Derler, D Slamanig
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
31*2018
Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives
D Derler, S Ramacher, D Slamanig
International Conference on Post-Quantum Cryptography, 419-440, 2018
282018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
D Derler, T Jager, D Slamanig, C Striecks
Advances in Cryptology-EUROCRYPT 2018-37th Annual International Conference …, 2018
282018
Key-Homomorphic Signatures: Definitions and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge
D Derler, D Slamanig
Designs, Codes and Cryptography, 1-41, 2018
23*2018
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
D Derler, K Samelin, D Slamanig, C Striecks
Network and Distributed System Security Symposium, 2019
202019
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes
D Derler, D Slamanig
International Conference on Provable Security, 455-474, 2015
192015
Revisiting proxy re-encryption: Forward secrecy, improved security, and applications
D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks
IACR International Workshop on Public Key Cryptography, 219-250, 2018
182018
Anonymous Ticketing for NFC-Enabled Mobile Phones
D Derler, K Potzmader, J Winter, K Dietrich
International Conference on Trusted Systems, 66-83, 2011
162011
Picnic
G Zaverucha, M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, ...
Technical report, NIST, 2017
15*2017
Overview of Functional and Malleable Signature Schemes
D Demirel, D Derler, C Hanser, HC Pöhls, D Slamanig, G Traverso
Technical report, H2020 Prismacloud, 2015
15*2015
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation
D Derler, S Ramacher, D Slamanig
Financial Cryptography and Data Security, 2017
142017
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
MT Beck, J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, ...
Australasian Conference on Information Security and Privacy, 437-452, 2017
132017
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability
O Blazy, D Derler, D Slamanig, R Spreitzer
Cryptographers’ Track at the RSA Conference, 127-143, 2016
102016
Generic double-authentication preventing signatures and a post-quantum instantiation
D Derler, S Ramacher, D Slamanig
International Conference on Provable Security, 258-276, 2018
92018
Signer-anonymous designated-verifier redactable signatures for cloud-based data sharing
D Derler, S Krenn, D Slamanig
International Conference on Cryptology and Network Security, 211-227, 2016
92016
Digital Signatures from Symmetric-Key Primitives.
D Derler, C Orlandi, S Ramacher, C Rechberger, D Slamanig
IACR Cryptology ePrint Archive 2016, 1085, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20