Dominique Schröder
Orcid: 0000-0001-6943-8914Affiliations:
- TU Wien, Austria
- TU Wien, Vienna, Austria
- Friedrich-Alexander-Universität Erlangen-Nürnberg (former)
- Saarland University, Germany (former)
- University of Maryland, MD, USA (former)
- Technische Universität Darmstadt, Germany (former)
According to our database1,
Dominique Schröder
authored at least 96 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on pets.wien
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Dependable Secur. Comput., 2025
IACR Cryptol. ePrint Arch., 2025
Fair Exchange for Decentralized Autonomous Organizations via Threshold Adaptor Signatures.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Inner Product Functional Commitments with Constant-Size Public Parameters and Openings.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proc. Priv. Enhancing Technol., 2019
J. Comput. Secur., 2019
Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
(Short Paper) Burning Zerocoins for Fun and for Profit - A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol.
Proceedings of the Crypto Valley Conference on Blockchain Technology, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Brief announcement: towards security and privacy for outsourced data in the multi-party setting.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Security of blind signatures under aborts and applications to adaptive oblivious transfer.
J. Math. Cryptol., 2012
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Proceedings of the Sicherheit 2010: Sicherheit, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles.
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Public Key Cryptography, 2009
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles.
Proceedings of the Pairing-Based Cryptography, 2009
Proceedings of the BIOSIG 2009, 2009
2006
Mobi: Eine Infrastruktur für das Internet der Dinge.
Proceedings of the Informatiktage 2006, 2006