Ron Steinfeld

Orcid: 0000-0003-1745-4183

Affiliations:
  • Monash University, Melbourne, Australia


According to our database1, Ron Steinfeld authored at least 152 papers between 2000 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Formal Treatment of Watchtowers and FPPW: A Fair and Privacy-Preserving Bitcoin Watchtower.
IEEE Trans. Dependable Secur. Comput., 2025

Pegasus and PegaRing: Efficient (Ring) Signatures from Sigma-Protocols for Power Residue PRFs with (Q)ROM Security.
IACR Cryptol. ePrint Arch., 2025

Post-Quantum Multi-Message Public Key Encryption from Extended Reproducible PKE.
IACR Cryptol. ePrint Arch., 2025

Constant Latency and Finality for Dynamically Available DAG.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs.
Proceedings of the Provable and Practical Security, 2025

2024
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices.
Dataset, April, 2024

Fast and private multi-dimensional range search over encrypted data.
Inf. Sci., January, 2024

Quantum-Safe HIBE: Does It Cost a Latte?
IEEE Trans. Inf. Forensics Secur., 2024

LeOPaRd: Towards Practical Post-Quantum Oblivious PRFs via Interactive Lattice Problems.
IACR Cryptol. ePrint Arch., 2024

Plover: Masking-Friendly Hash-and-Sign Lattice Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Modeling Mobile Crash in Byzantine Consensus.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Lattice-Based Cryptography: From Protocol Design to Fast and Secure Implementation.
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024

LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

Guest editorial: Special issue on Mathematics of Zero-Knowledge.
Des. Codes Cryptogr., November, 2023

Incremental symmetric puncturable encryption with support for unbounded number of punctures.
Des. Codes Cryptogr., April, 2023

High Throughput Lattice-based Signatures on GPUs: Comparing Falcon and Mitaka.
IACR Cryptol. ePrint Arch., 2023

ACE: A Consent-Embedded privacy-preserving search on genomic database.
CoRR, 2023

Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023

Post-Quantum Zero-Knowledge Proofs and Applications.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IEEE Trans. Dependable Secur. Comput., 2022

Geometric Range Search on Encrypted Data With Forward/Backward Security.
IEEE Trans. Dependable Secur. Comput., 2022

Range search on encrypted spatial data with dynamic updates.
J. Comput. Secur., 2022

Private Re-Randomization for Module LWE and Applications to Quasi-Optimal ZK-SNARKs.
IACR Cryptol. ePrint Arch., 2022

Daric: A Storage Efficient Payment Channel With Penalization Mechanism.
IACR Cryptol. ePrint Arch., 2022

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems.
IACR Cryptol. ePrint Arch., 2022

MatRiCT<sup>+</sup>: More Efficient Post-Quantum Private Blockchain Payments.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Daric: A Storage Efficient Payment Channel with Punishment Mechanism.
Proceedings of the Information Security - 25th International Conference, 2022

Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems.
Proceedings of the Information Security Practice and Experience, 2022

PRESSGenDB: PRivacy-prEserving Substring Search on Encrypted Genomic DataBase.
Proceedings of the IEEE INFOCOM 2022, 2022

Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives.
Proceedings of the Applied Cryptography and Network Security, 2022

Garrison: A Novel Watchtower Scheme for Bitcoin.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Multi-Client Cloud-Based Symmetric Searchable Encryption.
IEEE Trans. Dependable Secur. Comput., 2021

Performance Evaluation of Post-Quantum TLS 1.3 on Embedded Systems.
IACR Cryptol. ePrint Arch., 2021

MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments.
IACR Cryptol. ePrint Arch., 2021

Lattice-based zero-knowledge arguments for additive and multiplicative relations.
Des. Codes Cryptogr., 2021

PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database.
CoRR, 2021

On the Integer Polynomial Learning with Errors Problem.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data.
Proceedings of the Information Security - 24th International Conference, 2021

Massive MIMO Physical Layer Cryptosystem: Bob cannot decrypt uniquely!
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2021

Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand.
Proceedings of the Financial Cryptography and Data Security, 2021

Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021

Collaborative analysis of genomic data: vision and challenges.
Proceedings of the 7th IEEE International Conference on Collaboration and Internet Computing, 2021

Transparency or Anonymity Leak: Monero Mining Pools Data Publication.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers.
IEEE Trans. Computers, 2020

Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain.
IACR Cryptol. ePrint Arch., 2020

Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes.
IACR Cryptol. ePrint Arch., 2020

Comments on "Physical-layer cryptography through massive MIMO".
CoRR, 2020

Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Public-Key Puncturable Encryption: Modular and Compact Constructions.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

MPSign: A Signature from Small-Secret Middle-Product Learning with Errors.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers.
IACR Cryptol. ePrint Arch., 2019

Lattice RingCT v2.0 with Multiple Input and Output Wallets.
IACR Cryptol. ePrint Arch., 2019

Practical MP-LWE-based encryption balancing security-risk vs. efficiency.
IACR Cryptol. ePrint Arch., 2019

Practical $$\mathsf {MP} \text{- }\mathsf {LWE} $$ -based encryption balancing security-risk versus efficiency.
Des. Codes Cryptogr., 2019

Generic Multi-keyword Ranked Search on Encrypted Cloud Data.
Proceedings of the Computer Security - ESORICS 2019, 2019

DGM: A Dynamic and Revocable Group Merkle Signature.
Proceedings of the Computer Security - ESORICS 2019, 2019

Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Revocable and Linkable Ring Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

On The Unforkability of Monero.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Designing Smart Contract for Electronic Document Taxation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures.
Proceedings of the Applied Cryptography and Network Security, 2019

Risk of Asynchronous Protocol Update: Attacks to Monero Protocols.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
J. Cryptol., 2018

Monero Ring Attack: Recreating Zero Mixin Transaction Effect.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Platform-Independent Secure Blockchain-Based Voting System.
Proceedings of the Information Security - 21st International Conference, 2018

Anonymity Reduction Attacks to Monero.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties.
Proceedings of the Information Security Practice and Experience, 2017

Middle-Product Learning with Errors.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Multi-user Cloud-Based Secure Keyword Search.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

An implementation of access-control protocol for IoT home scenario.
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017

2016
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Anonymizing Bitcoin Transaction.
Proceedings of the Information Security Practice and Experience, 2016

An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015

On massive MIMO physical layer cryptosystem.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Rotational Cryptanalysis of ARX Revisited.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Practical attack on NLM-MAC scheme.
Inf. Process. Lett., 2014

Lattice-based certificateless public-key encryption in the standard model.
Int. J. Inf. Sec., 2014

Algebraic Attacks on Human Identification Protocols.
IACR Cryptol. ePrint Arch., 2014

A Subexponential Construction of Graph Coloring for Multiparty Computation.
IACR Cryptol. ePrint Arch., 2014

Lattice-based completely non-malleable public-key encryption in the standard model.
Des. Codes Cryptogr., 2014

GGHLite: More Efficient Multilinear Maps from Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Hardness of k-LWE and Applications in Traitor Tracing.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices.
IACR Cryptol. ePrint Arch., 2013

Security Analysis of Linearly Filtered NLFSRs.
IACR Cryptol. ePrint Arch., 2013

Breaking NLM-MAC Generator.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of RC4(n, m) stream cipher.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Security Evaluation of Rakaposhi Stream Cipher.
Proceedings of the Information Security Practice and Experience, 2013

Truncated Differential Analysis of Reduced-Round LBlock.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
On the modular inversion hidden number problem.
J. Symb. Comput., 2012

Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
J. Cryptol., 2012

Multi-party computation with conversion of secret sharing.
Des. Codes Cryptogr., 2012

Cryptanalysis of WG-7: a lightweight stream cipher.
Cryptogr. Commun., 2012

Active Security in Multiparty Computation over Black-Box Groups.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Cryptanalysis of RC4-Based Hash Function.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption).
IACR Cryptol. ePrint Arch., 2011

Making NTRU as Secure as Worst-Case Problems over Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Security for Signcryption: The Multi-User Model.
Proceedings of the Practical Signcryption, 2010

Known and Chosen Key Differential Distinguishers for Block Ciphers.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Faster Fully Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Efficient Fuzzy Matching and Intersection on Private Datasets.
Proceedings of the Information, Security and Cryptology, 2009

Efficient Public Key Encryption Based on Ideal Lattices.
Proceedings of the Advances in Cryptology, 2009

2008
Cryptanalysis of LASH.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Chinese Remaindering with Multiplicative Noise.
Theory Comput. Syst., 2007

New constructions of anonymous membership broadcasting schemes.
Adv. Math. Commun., 2007

How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007

On Secure Multi-party Computation in Black-Box Groups.
Proceedings of the Advances in Cryptology, 2007

2006
Lattice-based threshold-changeability for standard CRT secret-sharing schemes.
Finite Fields Their Appl., 2006

Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Proceedings of the Public Key Cryptography, 2006

A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders.
Proceedings of the Information Security, 9th International Conference, 2006

VSH, an Efficient and Provable Collision-Resistant Hash Function.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
Proceedings of the Advances in Cryptology, 2006

2005
Converse Results to the Wiener Attack on RSA.
Proceedings of the Public Key Cryptography, 2005

2004
Noisy Chinese remaindering in the Lee norm.
J. Complex., 2004

On the Security of RSA with Primes Sharing Least-Significant Bits.
Appl. Algebra Eng. Commun. Comput., 2004

Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Proceedings of the Public Key Cryptography, 2004

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
Proceedings of the Advances in Cryptology, 2004

2003
Universal Designated-Verifier Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Formal Proofs for the Security of Signcryption.
Proceedings of the Public Key Cryptography, 2002

Chinese Remaindering for Algebraic Numbers in a Hidden Field.
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002

On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Content Extraction Signatures.
Proceedings of the Information Security and Cryptology, 2001

An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits.
Proceedings of the Topics in Cryptology, 2001

2000
A Signcryption Scheme Based on Integer Factorization.
Proceedings of the Information Security, Third International Workshop, 2000


  Loading...