Dominique Unruh

Orcid: 0000-0001-8965-1931

Affiliations:
  • RWTH Aachen University, Germany
  • University of Tartu, Estonia
  • Karlsruhe Institute of Technology, Germany (PhD 2006)


According to our database1, Dominique Unruh authored at least 91 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Kraus Maps.
Arch. Formal Proofs, 2025

The Oneway to Hiding Theorem.
Arch. Formal Proofs, 2025

Bayesian Inference in Quantum Programs.
Proceedings of the 52nd International Colloquium on Automata, Languages, and Programming, 2025

Formalizing the One-Way to Hiding Theorem.
Proceedings of the 14th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2025

Leakage-Free Probabilistic Jasmin Programs.
Proceedings of the 14th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2025

2024
The Tensor Product on Hilbert Spaces.
Arch. Formal Proofs, 2024

Without Loss of Generality.
Arch. Formal Proofs, 2024

With-Type - Poor man's dependent types.
Arch. Formal Proofs, 2024

2023
Schnorr protocol in Jasmin.
IACR Cryptol. ePrint Arch., 2023

A Thorough Treatment of Highly-Efficient NTRU Instantiations.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Zero-Knowledge in EasyCrypt.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Towards Compressed Permutation Oracles.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Proceedings of the 33rd International Symposium on Algorithms and Computation, 2022

Reflection, rewinding, and coin-toss in EasyCrypt.
Proceedings of the CPP '22: 11th ACM SIGPLAN International Conference on Certified Programs and Proofs, Philadelphia, PA, USA, January 17, 2022

2021
Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3).
IACR Cryptol. ePrint Arch., 2021

Everlasting UC Commitments from Fully Malicious PUFs.
IACR Cryptol. ePrint Arch., 2021

Quantum and Classical Registers.
Arch. Formal Proofs, 2021

Complex Bounded Operators.
Arch. Formal Proofs, 2021

Relationships Between Quantum IND-CPA Notions.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Quantum Relational Hoare Logic with Expectations.
Proceedings of the 48th International Colloquium on Automata, Languages, and Programming, 2021

2020
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020

On quantum indistinguishability under chosen plaintext attack.
IACR Cryptol. ePrint Arch., 2020

Local Variables and Quantum Relational Hoare Logic.
CoRR, 2020

Banach-Steinhaus Theorem.
Arch. Formal Proofs, 2020

Generic Authenticated Key Exchange in the Quantum Random Oracle Model.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Post-Quantum Verification of Fujisaki-Okamoto.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Quantum relational Hoare logic.
Proc. ACM Program. Lang., 2019

Quantum Hoare Logic with Ghost Variables.
Proceedings of the 34th Annual ACM/IEEE Symposium on Logic in Computer Science, 2019

Quantum Security Proofs Using Semi-classical Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Quantum collision-resistance of non-uniformly distributed functions: upper and lower bounds.
Quantum Inf. Comput., 2018

On Quantum Indifferentiability.
IACR Cryptol. ePrint Arch., 2018

Post-quantum Security of the Sponge Construction.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
Collapsing sponges: Post-quantum security of the sponge construction.
IACR Cryptol. ePrint Arch., 2017

Post-quantum Security of Fiat-Shamir.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
An adaptive attack on Wiesner's quantum money.
Quantum Inf. Comput., 2016

Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Quantum Collision-Resistance of Non-uniformly Distributed Functions.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Post-Quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

Computationally Binding Quantum Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Collapse-Binding Quantum Commitments Without Random Oracles.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Quantum Security of the Fujisaki-Okamoto and OAEP Transforms.
IACR Cryptol. ePrint Arch., 2015

Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
The Synergy Between Programming Languages and Cryptography (Dagstuhl Seminar 14492).
Dagstuhl Reports, 2014

Quantum Attacks on Classical Proof Systems: The Hardness of Quantum Rewinding.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

Revocable Quantum Timed-Release Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Quantum Position Verification in the Random Oracle Model.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
On using probabilistic Turing machines to model participants in cryptographic protocols.
Theor. Comput. Sci., 2013

Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Symbolic Universal Composability.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Everlasting Multi-party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Programmable encryption and key-dependent messages.
IACR Cryptol. ePrint Arch., 2012

Everlasting Quantum Security.
IACR Cryptol. ePrint Arch., 2012

Security of Blind Signatures Revisited.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Quantum Proofs of Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Computational soundness without protocol restrictions.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Round Optimal Blind Signatures.
IACR Cryptol. ePrint Arch., 2011

Concurrent Composition in the Bounded Quantum Storage Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Termination-Insensitive Computational Indistinguishability (and Applications to Computational Soundness).
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Round Optimal Blind Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
The impossibility of computationally sound XOR.
IACR Cryptol. ePrint Arch., 2010

Universally Composable Quantum Multi-party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Universally Composable Incoercibility.
Proceedings of the Advances in Cryptology, 2010

Computationally sound verification of source code.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Polynomial Runtime and Composability.
IACR Cryptol. ePrint Arch., 2009

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable.
Proceedings of the Network and Distributed System Security Symposium, 2009

CoSP: a general framework for computational soundness proofs.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Computational soundness of symbolic zero-knowledge proofs.
IACR Cryptol. ePrint Arch., 2008

Compromising Reflections-or-How to Read LCD Monitors around the Corner.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

A Formal Language for Cryptographic Pseudocode.
Proceedings of the Logic for Programming, 2008

Towards Key-Dependent Message Security in the Standard Model.
Proceedings of the Advances in Cryptology, 2008

Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Limits of Constructive Security Proofs.
Proceedings of the Advances in Cryptology, 2008

OAEP Is Secure under Key-Dependent Messages.
Proceedings of the Advances in Cryptology, 2008

2007
On the Security of Protocols with Logarithmic Communication Complexity.
IACR Cryptol. ePrint Arch., 2007

Long-Term Security and Universal Composability.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

On the Necessity of Rewinding in Secure Multiparty Computation.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Information Flow in the Peer-Reviewing Process.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol.
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007

Random Oracles and Auxiliary Input.
Proceedings of the Advances in Cryptology, 2007

2006
Quantum programming languages.
Inform. Forsch. Entwickl., 2006

Simulatable Security and Polynomially Bounded Concurrent Composition.
IACR Cryptol. ePrint Arch., 2006

Simulatable Security and Polynomially Bounded Concurrent Composability.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Protokollkomposition und Komplexität.
Proceedings of the Ausgezeichnete Informatikdissertationen 2006, 2006

On the (Im-)Possibility of Extending Coin Toss.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Protokollkomposition und Komplexität.
PhD thesis, 2006

2005
Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited.
IACR Cryptol. ePrint Arch., 2005

Quantum Programs With Classical Output Streams: (Extended Abstract).
Proceedings of the 3rd International Workshop on Quantum Programming Languages, 2005

Comparing Two Notions of Simulatability.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

On the Notion of Statistical Security in Simulatability Definitions.
Proceedings of the Information Security, 8th International Conference, 2005

Polynomial Runtime in Simulatability Definitions.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

On fairness in simulatability-based cryptographic systems.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005


  Loading...