Christian Hanser

According to our database1, Christian Hanser authored at least 20 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Implementing RLWE-based Schemes Using an RSA Co-Processor.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials.
J. Cryptol., 2019

2018
Learning with Errors on RSA Co-Processors.
IACR Cryptol. ePrint Arch., 2018

2016
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2016

2015
Practical Round-Optimal Blind Signatures in the Standard Model.
IACR Cryptol. ePrint Arch., 2015

Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives.
IACR Cryptol. ePrint Arch., 2015

Towards Authenticity and Privacy Preserving Accountable Workflows.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Verifiably Encrypted Signatures: Security Revisited and a New Construction.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes.
IACR Cryptol. ePrint Arch., 2014

Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2014

Blank Digital Signatures: Optimization and Practical Experiences.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2013

Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013

Blank Digital Signatures.
IACR Cryptol. ePrint Arch., 2013

Group Signatures on Mobile Devices: Practical Experiences.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
On cloud storage and the cloud of clouds approach.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012


  Loading...