Andreas Erwig

Orcid: 0009-0000-8586-688X

According to our database1, Andreas Erwig authored at least 16 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
BIP32-Compatible Threshold Wallets.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Shared-Custodial Password-Authenticated Deterministic Wallets.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Provably Secure Advanced Cryptographic Wallets.
PhD thesis, 2023

BIP32-Compatible Threshold Wallets.
IACR Cryptol. ePrint Arch., 2023

CommiTEE : An Efficient and Secure Commit-Chain Protocol using TEEs.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Deterministic Wallets for Adaptor Signatures.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Large-Scale Non-Interactive Threshold Cryptosystems Through Anonymity.
IACR Cryptol. ePrint Arch., 2021

Bitcoin-Compatible Virtual Channels.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Two-Party Adaptor Signatures from Identification Schemes.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

The Exact Security of BIP32 Wallets.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Generalized Channels from Limited Blockchain Scripts and Adaptor Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Generalized Bitcoin-Compatible Channels.
IACR Cryptol. ePrint Arch., 2020

Deterministic Wallets in a Quantum World.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Fuzzy Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2017
Redactable Graph Hashing, Revisited - (Extended Abstract).
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017


  Loading...