Benedikt Wagner

Orcid: 0000-0002-4620-7264

According to our database1, Benedikt Wagner authored at least 42 papers between 2019 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Robust Distributed Arrays: Provably Secure Networking for Data Availability Sampling.
CoRR, April, 2025

A Practical Tutorial on Explainable AI Techniques.
ACM Comput. Surv., February, 2025

Proving the Security of PeerDAS without the AGM.
IACR Cryptol. ePrint Arch., 2025

Data Matching in Unequal Worlds and Applications to Smart Contracts.
IACR Cryptol. ePrint Arch., 2025

Silent Threshold Encryption with One-Shot Adaptive Security.
IACR Cryptol. ePrint Arch., 2025

Technical Note: LeanSig for Post-Quantum Ethereum.
IACR Cryptol. ePrint Arch., 2025

Hash-Based Multi-Signatures for Post-Quantum Ethereum.
IACR Commun. Cryptol., 2025

Sublinear-Round Broadcast without Trusted Setup.
Proceedings of the 2025 Annual ACM-SIAM Symposium on Discrete Algorithms, 2025

Kleptographic Attacks Against Implicit Rejection.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

At the Top of the Hypercube - Better Size-Time Tradeoffs for Hash-Based Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

T-Spoon: Tightly Secure Two-Round Multi-signatures with Key Aggregation.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Generic constructions of master-key KDM secure attribute-based encryption.
Des. Codes Cryptogr., January, 2024

Techniques for highly efficient and secure interactive signatures.
PhD thesis, 2024

A Documentation of Ethereum's PeerDAS.
IACR Cryptol. ePrint Arch., 2024

Tightly Secure Threshold Signatures over Pairing-Free Groups.
IACR Cryptol. ePrint Arch., 2024

Foundations of Data Availability Sampling.
IACR Commun. Cryptol., 2024

Sweep-UC: Swapping Coins Privately.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Toothpicks: More Efficient Fork-Free Two-Round Multi-signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

A Holistic Security Analysis of Monero Transactions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Twinkle: Threshold Signatures from DDH with Full Adaptive Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

FRIDA: Data Availability Sampling from FRI.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Practical Blind Signatures in Pairing-Free Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Jackpot: Non-interactive Aggregatable Lotteries.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Tightly Secure Non-interactive BLS Multi-signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

HARTS: High-Threshold, Adaptively Secure, and Robust Threshold Schnorr Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Generic Constructions of Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes.
IACR Cryptol. ePrint Arch., 2023

Token meets Wallet: Formalizing Privacy and Revocation for FIDO2.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Chopsticks: Fork-Free Two-Round Multi-signatures from Non-interactive Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Rai-Choo! Evolving Blind Signatures to the Next Level.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Lattice-Based Authenticated Key Exchange with Tight Security.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Tighter Security for Generic Authenticated Key Exchange in the QROM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Reasoning about what has been learned: Neural-Symbolic integration for explainable artificial intelligence.
PhD thesis, 2022

PI-Cut-Choo! Parallel Instance Cut and Choose for Practical Blind Signatures.
IACR Cryptol. ePrint Arch., 2022

FIDO2 With Two Displays - Or How to Protect Security-Critical Web Transactions Against Malware Attacks.
CoRR, 2022

Lattice-Based Signatures with Tight Adaptive Corruptions and More.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Neural-Symbolic Reasoning Under Open-World and Closed-World Assumptions.
Proceedings of the AAAI 2022 Spring Symposium on Machine Learning and Knowledge Engineering for Hybrid Intelligence (AAAI-MAKE 2022), 2022

2021
A historical perspective of explainable Artificial Intelligence.
WIREs Data Mining Knowl. Discov., 2021

Neural-Symbolic Integration for Interactive Learning and Conceptual Grounding.
CoRR, 2021

Short Identity-Based Signatures with Tight Security from Lattices.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Neural-Symbolic Integration for Fairness in AI.
Proceedings of the AAAI 2021 Spring Symposium on Combining Machine Learning and Knowledge Engineering (AAAI-MAKE 2021), 2021

2019
Understanding Counterexamples for Relational Properties with DIbugger.
Proceedings of the Sixth Workshop on Horn Clauses for Verification and Synthesis and Third Workshop on Program Equivalence and Relational Reasoning, 2019


  Loading...