David Derler
Orcid: 0000-0002-5345-3906
According to our database1,
David Derler
authored at least 33 papers
between 2011 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
Proceedings of the Financial Cryptography and Data Security, 2021
2020
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
2019
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
IACR Cryptol. ePrint Arch., 2019
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge.
Des. Codes Cryptogr., 2019
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
IACR Cryptol. ePrint Arch., 2018
Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs.
Des. Codes Cryptogr., 2018
Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation.
Proceedings of the Provable Security, 2018
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower.
IACR Cryptol. ePrint Arch., 2015
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes.
Proceedings of the Provable Security, 2015
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives.
Proceedings of the Topics in Cryptology, 2015
2014
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2011
Proceedings of the Trusted Systems - Third International Conference, 2011