The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dennis Hofheinz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Backes, Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
    On fairness in simulatability-based cryptographic systems. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:13-22 [Conf]
  2. Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
    Polynomial Runtime in Simulatability Definitions. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:156-169 [Conf]
  3. Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters
    Conditional Reactive Simulatability. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:424-443 [Conf]
  4. Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt
    Initiator-Resilient Universally Composable Key Exchange. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:61-84 [Conf]
  5. Dennis Hofheinz, Jörn Müller-Quade, Dominique Unruh
    On the (Im-)Possibility of Extending Coin Toss. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:504-521 [Conf]
  6. Michael Backes, Dennis Hofheinz
    How to Break and Repair a Universally Composable Signature Functionality. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:61-72 [Conf]
  7. Dennis Hofheinz, Dominique Unruh
    On the Notion of Statistical Security in Simulatability Definitions. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:118-133 [Conf]
  8. Dennis Hofheinz, Rainer Steinwandt
    A Practical Attack on Some Braid Group Based Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:187-198 [Conf]
  9. Dennis Hofheinz, Dominique Unruh
    Simulatable Security and Polynomially Bounded Concurrent Composability. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:169-183 [Conf]
  10. Dennis Hofheinz, John Malone-Lee, Martijn Stam
    Obfuscation for Cryptographic Purposes. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:214-232 [Conf]
  11. Dennis Hofheinz, Jörn Müller-Quade
    Universally Composable Commitments Using Random Oracles. [Citation Graph (0, 0)][DBLP]
    TCC, 2004, pp:58-76 [Conf]
  12. Dennis Hofheinz, Dominique Unruh
    Comparing Two Notions of Simulatability. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:86-103 [Conf]
  13. Maria Isabel Gonzalez Vasco, Dennis Hofheinz, Consuelo Martínez, Rainer Steinwandt
    On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:207-216 [Journal]
  14. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:502-518 [Conf]
  15. Dennis Hofheinz, Eike Kiltz
    Secure Hybrid Encryption from Weakened Key Encapsulation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:553-571 [Conf]

  16. CoSP: a general framework for computational soundness proofs. [Citation Graph (, )][DBLP]


  17. Programmable Hash Functions and Their Applications. [Citation Graph (, )][DBLP]


  18. The Group of Signed Quadratic Residues and Applications. [Citation Graph (, )][DBLP]


  19. Public-Key Encryption with Non-interactive Opening. [Citation Graph (, )][DBLP]


  20. Towards Key-Dependent Message Security in the Standard Model. [Citation Graph (, )][DBLP]


  21. Practical Chosen Ciphertext Secure Encryption from Factoring. [Citation Graph (, )][DBLP]


  22. Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. [Citation Graph (, )][DBLP]


  23. Bonsai Trees, or How to Delegate a Lattice Basis. [Citation Graph (, )][DBLP]


  24. Bounded Key-Dependent Message Security. [Citation Graph (, )][DBLP]


  25. Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. [Citation Graph (, )][DBLP]


  26. A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002