Anja Lehmann
Orcid: 0000-0002-2872-7899Affiliations:
- Hasso Plattner Institute, Potsdam, Germany
- IBM Research Zurich, Switzerland
According to our database1,
Anja Lehmann
authored at least 78 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on hpi.de
On csauthors.net:
Bibliography
2025
CoRR, October, 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Privacy-Preserving Multi-signatures: Generic Techniques and Constructions Without Pairings.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect.
Proc. Priv. Enhancing Technol., October, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
ACM J. Data Inf. Qual., 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
Proc. Priv. Enhancing Technol., 2019
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services.
Proceedings of the 2019 Global IoT Summit, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
J. Inf. Secur. Appl., 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Policies and Research in Identity Management, 2013
2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Topics in Cryptology, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the BIOSIG 2009, 2009
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
2007
Proceedings of the Information Hiding, 9th International Workshop, 2007
Proceedings of the Advances in Cryptology, 2007