Kristiyan Haralambiev

According to our database1, Kristiyan Haralambiev authored at least 19 papers between 2004 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions.
IACR Cryptol. ePrint Arch., 2015

Composable and Modular Anonymous Credentials: Definitions and Practical Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2013
Policy-based secure deletion.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Efficient Structure-Preserving Signature Scheme from Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Group to Group Commitments Do Not Shrink.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

2011
Efficient Cryptographic Primitives for Non-Interactive Zero-Knowledge Proofs and Applications.
PhD thesis, 2011

Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.
IACR Cryptol. ePrint Arch., 2011

HB<sup>N</sup>: An HB-like protocol secure against man-in-the-middle attacks.
IACR Cryptol. ePrint Arch., 2011

Non-interactive Confirmer Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Structure Preserving CCA Secure Encryption and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Double-Trapdoor Anonymous Tags for Traceable Signatures.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Signing on Elements in Bilinear Groups for Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2010

Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.
Proceedings of the Public Key Cryptography, 2010

Efficient Message Space Extension for Automorphic Signatures.
Proceedings of the Information Security - 13th International Conference, 2010

Cryptography against Continuous Memory Attacks.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

Structure-Preserving Signatures and Commitments to Group Elements.
Proceedings of the Advances in Cryptology, 2010

Efficient Public-Key Cryptography in the Presence of Key Leakage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2004
Large Scale Experiments for Semantic Labeling of Noun Phrases in Raw Text.
Proceedings of the Fourth International Conference on Language Resources and Evaluation, 2004


  Loading...