Daniel Masny

According to our database1, Daniel Masny authored at least 20 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
On Removing Rejection Conditions in Practical Lattice-Based Signatures.
IACR Cryptol. ePrint Arch., 2021

2020
Reusable Two-Round MPC from DDH.
IACR Cryptol. ePrint Arch., 2020

Reusable Two-Round MPC from DDH.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

2019
Endemic Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2019

Two-Round Oblivious Transfer from CDH or LPN.
IACR Cryptol. ePrint Arch., 2019

A Black-Box Construction of Fully-Simulatable, Round-Optimal Oblivious Transfer from Strongly Uniform Key Agreement.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

2018
Secure Multi-Party Computation from Strongly Uniform Key Agreement.
IACR Cryptol. ePrint Arch., 2018

2017
Naor-Yung paradigm with shared randomness and applications.
Theor. Comput. Sci., 2017

Authentication from Weak PRFs with Hidden Auxiliary Input.
IACR Cryptol. ePrint Arch., 2017

On the Round Complexity of OT Extension.
IACR Cryptol. ePrint Arch., 2017

New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
IACR Cryptol. ePrint Arch., 2017

2016
Cryptography from hard learning problems.
PhD thesis, 2016

Optimal Security Proofs for Signatures from Identification Schemes.
IACR Cryptol. ePrint Arch., 2016

Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems.
IACR Cryptol. ePrint Arch., 2016

2015
Simple Chosen-Ciphertext Security from Low-Noise LPN.
IACR Cryptol. ePrint Arch., 2015

Chosen-Ciphertext Security from Subset Sum.
IACR Cryptol. ePrint Arch., 2015

On the Hardness of Learning with Rounding over Small Modulus.
IACR Cryptol. ePrint Arch., 2015

Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice.
IACR Cryptol. ePrint Arch., 2015

2013
Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs.
IACR Cryptol. ePrint Arch., 2013

2011
Block cipher based security for severely resource-constrained implantable medical devices.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011


  Loading...