Christian Schaffner

Orcid: 0000-0002-1754-1415

According to our database1, Christian Schaffner authored at least 50 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Parallel repetition of local simultaneous state discrimination.
Quantum, 2025

QKD Oracles for Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2025

2022
Optimal Design of Time-of-Use Tariffs using Bilevel Optimization.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2022

Online-Extractability in the Quantum Random-Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding.
IACR Cryptol. ePrint Arch., 2021

A Guide for New Program Committee Members at Theoretical Computer Science Conferences.
CoRR, 2021

Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions.
Proceedings of the Financial Cryptography and Data Security, 2020

Secure Multi-party Quantum Computation with a Dishonest Majority.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Non-malleability for quantum public-key encryption.
IACR Cryptol. ePrint Arch., 2019

Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability.
IACR Cryptol. ePrint Arch., 2019

Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Quantum Indistinguishability of Random Sponges.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Quantum Homomorphic Encryption for Polynomial-Size Circuits.
Theory Comput., 2018

Post-quantum Security of the Sponge Construction.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Using Simon's algorithm to attack symmetric-key cryptographic primitives.
Quantum Inf. Comput., 2017

Quantum Fully Homomorphic Encryption with Verification.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Computational Security of Quantum Encryption.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Semantic Security and Indistinguishability in the Quantum World.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Quantum Homomorphic Encryption for Polynomial-Sized Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Multiparty Zero-Error Classical Channel Coding With Entanglement.
IEEE Trans. Inf. Theory, 2015

Quantum Cryptography Beyond Quantum Key Distribution.
IACR Cryptol. ePrint Arch., 2015

Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography.
CoRR, 2015

2014
On the Parallel Repetition of Multi-Player Games: The No-Signaling Case.
Proceedings of the 9th Conference on the Theory of Quantum Computation, 2014

2013
The garden-hose model.
Proceedings of the Innovations in Theoretical Computer Science, 2013

2012
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation
CoRR, 2012

An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification.
Proceedings of the Theory of Quantum Computation, 2012

2011
Position-Based Quantum Cryptography.
ERCIM News, 2011

Security and Composability of Randomness Expansion from Bell Inequalities
CoRR, 2011

The Garden-Hose Game: A New Model of Computation, and Application to Position-Based Quantum Cryptography
CoRR, 2011

Position-Based Quantum Cryptography: Impossibility and Constructions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Random Oracles in a Quantum World.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Random Oracles in a Quantum World
CoRR, 2010

Leftover Hashing against quantum side information.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
The operational meaning of min- and max-entropy.
IEEE Trans. Inf. Theory, 2009

Robust cryptography in the noisy-quantum-storage model.
Quantum Inf. Comput., 2009

Composing Quantum Protocols in a Classical Environment.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Improving the Security of Quantum Protocols via Commit-and-Open.
Proceedings of the Advances in Cryptology, 2009

On the Power of Two-Party Quantum Cryptography.
Proceedings of the Advances in Cryptology, 2009

2008
Randomness Extraction Via <i>delta</i> -Biased Masking in the Presence of a Quantum Attacker.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

2007
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker.
IACR Cryptol. ePrint Arch., 2007

Cryptography from Noisy Photonic Storage
CoRR, 2007

Cryptography in the Bounded-Quantum-Storage Model
CoRR, 2007

Secure Identification and QKD in the Bounded-Quantum-Storage Model.
Proceedings of the Advances in Cryptology, 2007

A Tight High-Order Entropic Quantum Uncertainty Relation with Applications.
Proceedings of the Advances in Cryptology, 2007

2006
Information-Theoretic Conditions for Two-Party Secure Function Evaluation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Oblivious Transfer and Linear Functions.
Proceedings of the Advances in Cryptology, 2006

2005
Cryptography in the bounded quantum-storage model.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005


  Loading...