Jonas Schneider-Bensch

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany


According to our database1, Jonas Schneider-Bensch authored at least 14 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Formal Security and Functional Verification of Cryptographic Protocol Implementations in Rust.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
hax: Verifying Security-Critical Rust Software Using Multiple Provers.
Proceedings of the Verified Software. Theories, Tools and Experiments, 2024

2022
ROAST: Robust Asynchronous Schnorr Threshold Signatures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
New approaches to privacy preserving signatures.
PhD thesis, 2021

2019
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Membership Privacy for Fully Dynamic Group Signatures.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
IACR Cryptol. ePrint Arch., 2018

Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2016
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Foundations of Reconfigurable PUFs (Full Version).
IACR Cryptol. ePrint Arch., 2015

Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys.
IACR Cryptol. ePrint Arch., 2015

Foundations of Reconfigurable PUFs.
Proceedings of the Applied Cryptography and Network Security, 2015

2013
Identity-based steganography and its applications to censorship resistance.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...