Jacob C. N. Schuldt
Orcid: 0000-0002-1530-0861
According to our database1,
Jacob C. N. Schuldt
authored at least 58 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Open J. Comput. Soc., 2025
Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures.
Proceedings of the Computer Security - ESORICS 2025, 2025
2024
A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
Des. Codes Cryptogr., May, 2023
PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
IACR Cryptol. ePrint Arch., 2021
Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Proceedings of the Provable Security, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Proceedings of the Provable Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Int. J. Inf. Sec., 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
Proceedings of the Applied Cryptography and Network Security, 2011
Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Information Security, 2010
2009
Proceedings of the Progress in Cryptology, 2009
2008
Proceedings of the Public Key Cryptography, 2008
2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006