Christopher Portmann

Orcid: 0000-0003-2679-1202

According to our database1, Christopher Portmann authored at least 20 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Multi-Designated Receiver Signed Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

2021
Giving an Adversary Guarantees (Or: How to Model Designated Verifier Signatures in a Composable Framework).
IACR Cryptol. ePrint Arch., 2021

Security in Quantum Cryptography.
CoRR, 2021

2020
Unifying Generic Group Models.
IACR Cryptol. ePrint Arch., 2020

Revisiting (R)CCA Security and Replay Protection.
IACR Cryptol. ePrint Arch., 2020

2019
Composable and Finite Computational Security of Quantum Message Transmission.
IACR Cryptol. ePrint Arch., 2019

2018
Toward an algebraic theory of systems.
Theor. Comput. Sci., 2018

2017
Causal Boxes: Quantum Information-Processing Systems Closed Under Composition.
IEEE Trans. Inf. Theory, 2017

Quantum Authentication with Key Recycling.
IACR Cryptol. ePrint Arch., 2017

Composable security in relativistic quantum cryptography.
CoRR, 2017

(Quantum) Min-Entropy Resources.
CoRR, 2017

2016
Quantum-Proof Multi-Source Randomness Extractors in the Markov Model.
Proceedings of the 11th Conference on the Theory of Quantum Computation, 2016

2014
Key Recycling in Authentication.
IEEE Trans. Inf. Theory, 2014

Cryptographic security of quantum key distribution.
CoRR, 2014

Composable Security of Delegated Quantum Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2012
Trevisan's Extractor in the Presence of Quantum Side Information.
SIAM J. Comput., 2012

A modular framework for randomness extraction based on Trevisan's construction
CoRR, 2012

2011
Information-Theoretic Secrecy with Access to Decryption Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity.
IACR Cryptol. ePrint Arch., 2011

2008
On the Power of Quantum Encryption Keys.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008


  Loading...