Lucjan Hanzlik

Orcid: 0009-0006-1941-693X

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Stanford University, USA


According to our database1, Lucjan Hanzlik authored at least 61 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Post Quantum Fuzzy Stealth Signatures and Applications.
IACR Cryptol. ePrint Arch., 2023

Non-Interactive Blind Signatures for Random Messages.
IACR Cryptol. ePrint Arch., 2023

M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition.
IACR Cryptol. ePrint Arch., 2023

On the Security of Rate-limited Privacy Pass.
IACR Cryptol. ePrint Arch., 2023

SoK: Signatures With Randomizable Keys.
IACR Cryptol. ePrint Arch., 2023

Fast IDentity Online with Anonymous Credentials (FIDO-AC).
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
Proc. Priv. Enhancing Technol., 2022

PI-Cut-Choo! Parallel Instance Cut and Choose for Practical Blind Signatures.
IACR Cryptol. ePrint Arch., 2022

Rai-Choo! Evolving Blind Signatures to the Next Level.
IACR Cryptol. ePrint Arch., 2022

Token meets Wallet: Formalizing Privacy and Revocation for FIDO2.
IACR Cryptol. ePrint Arch., 2022

Sweep-UC: Swapping Coins Privately.
IACR Cryptol. ePrint Arch., 2022

McFly: Verifiable Encryption to the Future Made Practical.
IACR Cryptol. ePrint Arch., 2022

A framework for constructing Single Secret Leader Election from MPC.
IACR Cryptol. ePrint Arch., 2022

Explainable Arguments.
Proceedings of the Financial Cryptography and Data Security, 2022

PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2021

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

ePassport and eID Technologies.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Single Secret Leader Election.
IACR Cryptol. ePrint Arch., 2020

TrollThrottle - Raising the Cost of Astroturfing.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019

CTRL-PACE: Controlled Randomness for e-Passport Password Authentication.
Fundam. Informaticae, 2019

simTPM: User-centric TPM for Mobile Devices (Technical Report).
CoRR, 2019

simTPM: User-centric TPM for Mobile Devices.
Proceedings of the 28th USENIX Security Symposium, 2019

Pseudonymous Signature Schemes.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Efficient VLR group signatures for smart cards.
Int. J. Embed. Syst., 2018

Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token.
IACR Cryptol. ePrint Arch., 2018

Membership Privacy for Fully Dynamic Group Signatures.
IACR Cryptol. ePrint Arch., 2018

Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
IACR Cryptol. ePrint Arch., 2018

Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Two-Move and Setup-Free Blind Signatures with Perfect Blindness.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017

2016
Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups".
IACR Cryptol. ePrint Arch., 2016

Local Self-Organization with Strong Privacy Protection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Computations on Private Sets and their Application to Biometric based Authentication Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Thermal Imaging Attacks on Keypad Security Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Controlled Randomness - A Defense Against Backdoors in Cryptographic Devices.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2.
Proceedings of the Information Security - 19th International Conference, 2016

A Formal Concept of Domain Pseudonymous Signatures.
Proceedings of the Information Security Practice and Experience, 2016

A Short Paper on Blind Signatures from Knowledge Assumptions.
Proceedings of the Financial Cryptography and Data Security, 2016

Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Restricted Identification Secure in the Extended Canetti-Krawczyk Model.
J. Univers. Comput. Sci., 2015

Tracing Attacks on U-Prove with Revocation Mechanism.
IACR Cryptol. ePrint Arch., 2015

Insecurity of Anonymous Login with German Personal Identity Cards.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

Anonymous Evaluation System.
Proceedings of the Network and System Security - 9th International Conference, 2015

Hard Invalidation of Electronic Signatures.
Proceedings of the Information Security Practice and Experience, 2015

Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove.
Proceedings of the 10th ACM Symposium on Information, 2015

Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Attack against a Pairing Based Anonymous Authentication Protocol.
Proceedings of the SOFSEM 2014: Theory and Practice of Computer Science, 2014

Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols.
Proceedings of the Information Security Practice and Experience, 2014

Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users.
Proceedings of the Financial Cryptography and Data Security, 2014

A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates.
Proceedings of the Financial Cryptography and Data Security, 2014

Stand-by Attacks on E-ID Password Authentication.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
Attack against Ibrahim's Distributed Key Generation for RSA.
Int. J. Netw. Secur., 2013

Mutual Chip Authentication.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Identity Security in Biometric Systems based on Keystroking.
Proceedings of the SECRYPT 2013, 2013

Simplified PACE|AA Protocol.
Proceedings of the Information Security Practice and Experience, 2013

Mutual Restricted Identification.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

2012
Restricted Identification without Group Keys.
Proceedings of the 11th IEEE International Conference on Trust, 2012


  Loading...