Search the dblp DataBase
Eike Kiltz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Eike Kiltz , David Galindo Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:336-347 [Conf ] David Galindo , Javier Herranz , Eike Kiltz On the Generic Construction of Identity-Based Signatures with Additional Properties. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:178-193 [Conf ] Eike Kiltz , Hans-Ulrich Simon Complexity Theoretic Aspects of Some Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] COCOON, 2003, pp:294-303 [Conf ] Michel Abdalla , Mihir Bellare , Dario Catalano , Eike Kiltz , Tadayoshi Kohno , Tanja Lange , John Malone-Lee , Gregory Neven , Pascal Paillier , Haixia Shi Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:205-222 [Conf ] Eike Kiltz A Primitive for Proving the Security of Every Bit and About Universal Hash Functions & Hard Core Bits. [Citation Graph (0, 0)][DBLP ] FCT, 2001, pp:388-391 [Conf ] Eike Kiltz , Anton Mityagin , Saurabh Panjwani , Barath Raghavan Append-Only Signatures. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:434-445 [Conf ] Eike Kiltz , John Malone-Lee A General Construction of IND-CCA2 Secure Public Key Encryption. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:152-166 [Conf ] Eike Kiltz A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:339-350 [Conf ] Eike Kiltz On the Limitations of the Spread of an IBE-to-PKE Transformation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:274-289 [Conf ] David Galindo , Eike Kiltz Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:173-185 [Conf ] Eike Kiltz On the Representation of Boolean Predicates of the Diffie-Hellman Function. [Citation Graph (0, 0)][DBLP ] STACS, 2003, pp:223-233 [Conf ] Ivan Damgård , Matthias Fitzi , Eike Kiltz , Jesper Buus Nielsen , Tomas Toft Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. [Citation Graph (0, 0)][DBLP ] TCC, 2006, pp:285-304 [Conf ] Eike Kiltz , Payman Mohassel , Enav Weinreb , Matthew K. Franklin Secure Linear Algebra Using Linearly Recurrent Sequences. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:291-310 [Conf ] Eike Kiltz Chosen-Ciphertext Security from Tag-Based Encryption. [Citation Graph (0, 0)][DBLP ] TCC, 2006, pp:581-600 [Conf ] Eike Kiltz , Gregor Leander , John Malone-Lee Secure Computation of the Mean and Related Statistics. [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:283-302 [Conf ] Eike Kiltz , Arne Winterhof Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2006, v:154, n:2, pp:326-336 [Journal ] Eike Kiltz , Hans-Ulrich Simon Threshold circuit lower bounds on cryptographic functions. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 2005, v:71, n:2, pp:185-212 [Journal ] Ronald Cramer , Goichiro Hanaoka , Dennis Hofheinz , Hideki Imai , Eike Kiltz , Rafael Pass , Abhi Shelat , Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:502-518 [Conf ] Dennis Hofheinz , Eike Kiltz Secure Hybrid Encryption from Weakened Key Encapsulation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:553-571 [Conf ] Ronald Cramer , Eike Kiltz , Carles Padró A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:613-630 [Conf ] Michel Abdalla , Eike Kiltz , Gregory Neven Generalized Key Delegation for Hierarchical Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:139-154 [Conf ] Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:282-297 [Conf ] Chosen Ciphertext Security with Optimal Ciphertext Overhead. [Citation Graph (, )][DBLP ] Programmable Hash Functions and Their Applications. [Citation Graph (, )][DBLP ] The Group of Signed Quadratic Residues and Applications. [Citation Graph (, )][DBLP ] Instantiability of RSA-OAEP under Chosen-Plaintext Attack. [Citation Graph (, )][DBLP ] Public-Key Encryption with Non-interactive Opening. [Citation Graph (, )][DBLP ] CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. [Citation Graph (, )][DBLP ] Secure Linear Algebra Using Linearly Recurrent Sequences. [Citation Graph (, )][DBLP ] The Twin Diffie-Hellman Problem and Applications. [Citation Graph (, )][DBLP ] On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. [Citation Graph (, )][DBLP ] A New Randomness Extraction Paradigm for Hybrid Encryption. [Citation Graph (, )][DBLP ] Practical Chosen Ciphertext Secure Encryption from Factoring. [Citation Graph (, )][DBLP ] Bonsai Trees, or How to Delegate a Lattice Basis. [Citation Graph (, )][DBLP ] Adaptive Trapdoor Functions and Chosen-Ciphertext Security. [Citation Graph (, )][DBLP ] Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. [Citation Graph (, )][DBLP ] Compact CCA-Secure Encryption for Messages of Arbitrary Length. [Citation Graph (, )][DBLP ] Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. [Citation Graph (, )][DBLP ] More Constructions of Lossy and Correlation-Secure Trapdoor Functions. [Citation Graph (, )][DBLP ] A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. [Citation Graph (, )][DBLP ] Leakage-Resilient Signatures. [Citation Graph (, )][DBLP ] Efficient hybrid encryption from ID-based encryption. [Citation Graph (, )][DBLP ] Search in 0.054secs, Finished in 0.055secs