Kai Samelin
According to our database1,
Kai Samelin
authored at least 37 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
2019
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016
Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013
Proceedings of the Public Key Infrastructures, Services and Applications, 2013
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2012
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011
Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency.
Proceedings of the Applied Cryptography and Network Security, 2011