Jacob C. N. Schuldt

According to our database1, Jacob C. N. Schuldt authored at least 56 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On private information retrieval supporting range queries.
Int. J. Inf. Sec., February, 2024

A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Privacy-Preserving Verifiable CNNs.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Maliciously circuit-private multi-key FHE and MPC based on LWE.
Des. Codes Cryptogr., May, 2023

PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Two-Dimensional Dynamic Fusion for Continuous Authentication.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
Proc. Priv. Enhancing Technol., 2022

Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain.
IACR Cryptol. ePrint Arch., 2022

Secure Parallel Computation on Privately Partitioned Data and Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Efficient Two-Party Exponentiation from Quotient Transfer.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Oblivious Linear Group Actions and Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
A New Combiner for Key Encapsulation Mechanisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch., 2019

2018
Related Randomness Security for Public Key Encryption, Revisited.
IACR Cryptol. ePrint Arch., 2018

Statistical attacks on cookie masking for RC4.
Cryptogr. Commun., 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

A New Key Encapsulation Combiner.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
Card-Based Protocols Using Regular Polygon Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Security of Non-Interactive Key Exchange against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Signatures from Trapdoor Commitments with Strong Openings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016

Secure Computation Protocols Using Polarizing Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Convertible Nominative Signatures from Standard Assumptions without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Spritz - a spongy RC4-like stream cipher and hash function.
IACR Cryptol. ePrint Arch., 2016

Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results.
IACR Cryptol. ePrint Arch., 2016

On signatures with tight security in the multi-user setting.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Security Against Related Randomness Attacks via Reconstructive Extractors.
IACR Cryptol. ePrint Arch., 2015

On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks.
IACR Cryptol. ePrint Arch., 2015

Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Proceedings of the Provable Security, 2015

Secure Multi-Party Computation Using Polarizing Cards.
Proceedings of the Advances in Information and Computer Security, 2015

Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Group signature implies public-key encryption with non-interactive opening.
Int. J. Inf. Sec., 2014

Related Randomness Attacks for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2014

Multi-recipient encryption, revisited.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper).
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Plaintext Recovery Attacks Against WPA/TKIP.
IACR Cryptol. ePrint Arch., 2013

On the Security of RC4 in TLS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
IACR Cryptol. ePrint Arch., 2012

On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2012

Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Wildcarded Identity-Based Encryption.
J. Cryptol., 2011

Efficient Convertible Undeniable Signatures with Delegatable Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

On the Joint Security of Encryption and Signature, Revisited.
IACR Cryptol. ePrint Arch., 2011

Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
Proceedings of the Applied Cryptography and Network Security, 2011

Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting.
Proceedings of the Applied Cryptography and Network Security, 2011

2009
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.
IACR Cryptol. ePrint Arch., 2009

On-line Non-transferable Signatures Revisited.
IACR Cryptol. ePrint Arch., 2009

Efficient Constructions of Signcryption Schemes and Signcryption Composability.
Proceedings of the Progress in Cryptology, 2009

2008
Proxy Signatures Secure Against Proxy Key Exposure.
Proceedings of the Public Key Cryptography, 2008

2006
Efficient Identity-based Signatures Secure in the Standard Model.
IACR Cryptol. ePrint Arch., 2006

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.
IACR Cryptol. ePrint Arch., 2006


  Loading...