Michael Naehrig
Orcid: 0009-0001-7119-5242
According to our database1,
Michael Naehrig
authored at least 49 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
The DROP Protocol: Dispute Resolution via Observation in Public for Verifiable, In-Person Voting.
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections.
Proceedings of the Electronic Voting - 10th International Joint Conference, 2025
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2017
Int. J. Appl. Cryptogr., 2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
J. Cryptogr. Eng., 2016
CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy.
Proceedings of the 33nd International Conference on Machine Learning, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015
2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Progress in Cryptology, 2010
2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Progress in Cryptology, 2008
2005
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005