Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper).. Financial Cryptography, volume 7397 of Lecture Notes in Computer Science, page 215-222. Springer, (2012)Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials., and . ASIACRYPT (1), volume 8873 of Lecture Notes in Computer Science, page 491-511. Springer, (2014)Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions., , , and . IACR Cryptol. ePrint Arch., (2020)The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality., and . J. Inf. Secur. Appl., (2016)A New Architecture for Developing Cryptographic Cloud Services., , , and . ERCIM News, (2016)Digital Signatures from Symmetric-Key Primitives., , , , and . IACR Cryptology ePrint Archive, (2016)Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge., and . Des. Codes Cryptogr., 87 (6): 1373-1413 (2019)Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange., , , , and . IACR Cryptol. ePrint Arch., (2018)Design strategies for a privacy-friendly Austrian eID system in the public cloud., and . Comput. Secur., (2015)I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting., , , and . IACR Cryptol. ePrint Arch., (2019)