Nils Fleischhacker

Orcid: 0000-0002-2770-5444

Affiliations:
  • Ruhr University Bochum, Germany
  • Carnegie Mellon University, Pittsburgh, PA, USA
  • Johns Hopkins University, Baltimore, MD, USA
  • Saarland University, CISPA, Saarbrücken, Germany


According to our database1, Nils Fleischhacker authored at least 31 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Guaranteeing a Dishonest Party's Knowledge (Or: Setup Requirements for Deniable Authentication).
IACR Cryptol. ePrint Arch., 2025

2024
Invertible Bloom Lookup Tables with Less Memory and Randomness.
Proceedings of the 32nd Annual European Symposium on Algorithms, 2024

Jackpot: Non-interactive Aggregatable Lotteries.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Compressing Encrypted Data Over Small Fields.
IACR Cryptol. ePrint Arch., 2023

How to Compress Encrypted Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Interactive Non-Malleable Codes Against Desynchronizing Attacks in the Multi-Party Setting.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

Chipmunk: Better Synchronized Multi-Signatures from Lattices.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Steganography-Free Zero-Knowledge.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Squirrel: Efficient Synchronized Multi-Signatures from Lattices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Property-Preserving Hash Functions from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2021

On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Robust Property-Preserving Hash Functions for Hamming Distance and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2019
Interactive Non-malleable Codes.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Arithmetic Garbling from Bilinear Maps.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
On the Existence of Three Round Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Minimal assumptions in cryptography.
PhD thesis, 2017

2016
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

On Statistically Secure Obfuscation with Approximate Correctness.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys.
IACR Cryptol. ePrint Arch., 2015

2014
A Modular Framework for Multi-Factor Authentication and Key Exchange.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

On Tight Security Proofs for Schnorr Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Unconditional Tightness Bounds for Generic Reductions: The Exact Security of Schnorr Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2013

Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Proceedings of the Advances in Cryptology, 2013

Pseudorandom signatures.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2012

2011
SDF - Solar-aware distributed flow in wireless sensor networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011


  Loading...