Structure-preserving signatures on equivalence classes and constant-size anonymous credentials G Fuchsbauer, C Hanser, D Slamanig Journal of Cryptology 32, 498-546, 2019 | 127 | 2019 |
Revisiting cryptographic accumulators, additional properties and relations to other primitives D Derler, C Hanser, D Slamanig Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015 | 123 | 2015 |
Structure-preserving signatures on equivalence classes and their application to anonymous credentials C Hanser, D Slamanig Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 98 | 2014 |
Practical round-optimal blind signatures in the standard model G Fuchsbauer, C Hanser, D Slamanig Annual Cryptology Conference, 233-253, 2015 | 97 | 2015 |
On cloud storage and the cloud of clouds approach D Slamanig, C Hanser 2012 International Conference for Internet Technology and Secured …, 2012 | 75 | 2012 |
Implementing RLWE-based schemes using an RSA co-processor MR Albrecht, C Hanser, A Hoeller, T Pöppelmann, F Virdia, A Wallner Cryptology ePrint Archive, 2018 | 58 | 2018 |
Practical round-optimal blind signatures in the standard model from weaker assumptions G Fuchsbauer, C Hanser, C Kamath, D Slamanig International Conference on Security and Cryptography for Networks, 391-408, 2016 | 36 | 2016 |
Blank digital signatures C Hanser, D Slamanig Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 36 | 2013 |
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves C Hanser, D Slamanig SECRYPT 2013, 10th International Conference on Security and Cryptography, 15-26, 2013 | 29 | 2013 |
Group signatures on mobile devices: Practical experiences K Potzmader, J Winter, D Hein, C Hanser, P Teufl, L Chen Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013 | 24 | 2013 |
A new approach to efficient revocable attribute-based anonymous credentials D Derler, C Hanser, D Slamanig IMA International Conference on Cryptography and Coding, 57-74, 2015 | 22 | 2015 |
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes. G Fuchsbauer, C Hanser, D Slamanig IACR Cryptol. ePrint Arch. 2014, 944, 2014 | 22 | 2014 |
Verifiably encrypted signatures: Security revisited and a new construction C Hanser, M Rabkin, D Schröder Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 17 | 2015 |
PRISMACLOUD D4. 4: overview of functional and malleable signature schemes D Demirel, D Derler, C Hanser, H Pöhls, D Slamanig, G Traverso ., 2015 | 16 | 2015 |
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials. D Derler, C Hanser, D Slamanig DBSec 2014 2014, 49-65, 2014 | 9 | 2014 |
Blank digital signatures: optimization and practical experiences D Derler, C Hanser, D Slamanig IFIP International Summer School on Privacy and Identity Management, 201-215, 2014 | 8 | 2014 |
Towards authenticity and privacy preserving accountable workflows D Derler, C Hanser, HC Pöhls, D Slamanig Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9 …, 2016 | 5 | 2016 |
Warrant-hiding delegation-by-certificate proxy signature schemes C Hanser, D Slamanig International Conference on Cryptology in India, 60-77, 2013 | 5 | 2013 |
Speeding up the fixed-base comb method for faster scalar multiplication on Koblitz curves C Hanser, C Wagner Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 4 | 2013 |
New trends in elliptic curve cryptography C Hanser na, 2010 | 4 | 2010 |