Jacob C. N. Schuldt

Orcid: 0000-0002-1530-0861

According to our database1, Jacob C. N. Schuldt authored at least 58 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fast and Private 1-to-$N$ Face Identification Protocols.
IEEE Open J. Comput. Soc., 2025

Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Privacy-Preserving Verifiable CNNs.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Maliciously circuit-private multi-key FHE and MPC based on LWE.
Des. Codes Cryptogr., May, 2023

PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Two-Dimensional Dynamic Fusion for Continuous Authentication.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Secure Parallel Computation on Privately Partitioned Data and Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Efficient Two-Party Exponentiation from Quotient Transfer.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
IACR Cryptol. ePrint Arch., 2021

Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Oblivious Linear Group Actions and Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
On Private Information Retrieval Supporting Range Queries.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
A New Combiner for Key Encapsulation Mechanisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Statistical Attacks on Cookie Masking for RC4.
IACR Cryptol. ePrint Arch., 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

Related Randomness Security for Public Key Encryption, Revisited.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

A New Key Encapsulation Combiner.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
Card-Based Protocols Using Regular Polygon Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Security of Non-Interactive Key Exchange against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016

Secure Computation Protocols Using Polarizing Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Convertible Nominative Signatures from Standard Assumptions without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Spritz - a spongy RC4-like stream cipher and hash function.
IACR Cryptol. ePrint Arch., 2016

On signatures with tight security in the multi-user setting.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Signatures from trapdoor commitments with strong openings.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Proceedings of the Provable Security, 2015

Secure Multi-Party Computation Using Polarizing Cards.
Proceedings of the Advances in Information and Computer Security, 2015

Security Against Related Randomness Attacks via Reconstructive Extractors.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Group signature implies public-key encryption with non-interactive opening.
Int. J. Inf. Sec., 2014

Related Randomness Attacks for Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Plaintext Recovery Attacks Against WPA/TKIP.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Multi-recipient encryption, revisited.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
On the Security of RC4 in TLS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Wildcarded Identity-Based Encryption.
J. Cryptol., 2011

Efficient Convertible Undeniable Signatures with Delegatable Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

On-line Non-transferable Signatures Revisited.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

On the Joint Security of Encryption and Signature, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
Proceedings of the Applied Cryptography and Network Security, 2011

Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.
Proceedings of the Information Security, 2010

2009
Efficient Constructions of Signcryption Schemes and Signcryption Composability.
Proceedings of the Progress in Cryptology, 2009

2008
Proxy Signatures Secure Against Proxy Key Exposure.
Proceedings of the Public Key Cryptography, 2008

2007
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Efficient Identity-Based Signatures Secure in the Standard Model.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006


  Loading...