Jens Groth
Orcid: 0000-0001-6291-7832Affiliations:
- DFINITY, Zurich, Switzerland
According to our database1,
Jens Groth
authored at least 67 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
J. Cryptol., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Snarky Signatures: Minimal Signatures of Knowledge from Simulation-Extractable SNARKs.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Proceedings of the Foundations of Security Analysis and Design VIII, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the Advances in Cryptology, 2013
2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures.
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Financial Cryptography, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the Secure Electronic Voting, 2003
Proceedings of the 35th Annual ACM Symposium on Theory of Computing, 2003
Proceedings of the Public Key Cryptography, 2003