Ron Steinfeld
Orcid: 0000-0003-1745-4183Affiliations:
- Monash University, Melbourne, Australia
According to our database1,
Ron Steinfeld
authored at least 152 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Formal Treatment of Watchtowers and FPPW: A Fair and Privacy-Preserving Bitcoin Watchtower.
IEEE Trans. Dependable Secur. Comput., 2025
Pegasus and PegaRing: Efficient (Ring) Signatures from Sigma-Protocols for Power Residue PRFs with (Q)ROM Security.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Provable and Practical Security, 2025
2024
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices.
Dataset, April, 2024
Inf. Sci., January, 2024
LeOPaRd: Towards Practical Post-Quantum Oblivious PRFs via Interactive Lattice Problems.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 2024 on Cloud Computing Security Workshop, 2024
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023
Des. Codes Cryptogr., November, 2023
Incremental symmetric puncturable encryption with support for unbounded number of punctures.
Des. Codes Cryptogr., April, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices.
Proceedings of the 20th ACM International Conference on Computing Frontiers, 2023
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
IACR Cryptol. ePrint Arch., 2022
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022
Vandermonde meets Regev: Public Key Encryption Schemes Based on Partial Vandermonde Problems.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Proceedings of the Information Security - 25th International Conference, 2022
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems.
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database.
CoRR, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
A Non-interactive Multi-user Protocol for Private Authorised Query Processing on Genomic Data.
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand.
Proceedings of the Financial Cryptography and Data Security, 2021
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the 7th IEEE International Conference on Collaboration and Internet Computing, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IEEE Trans. Computers, 2020
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain.
IACR Cryptol. ePrint Arch., 2020
Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Practical $$\mathsf {MP} \text{- }\mathsf {LWE} $$ -based encryption balancing security-risk versus efficiency.
Des. Codes Cryptogr., 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
J. Cryptol., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the 16th IEEE/ACIS International Conference on Computer and Information Science, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Information Security Practice and Experience, 2016
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Int. J. Inf. Sec., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Information Security Practice and Experience, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
J. Cryptol., 2012
Des. Codes Cryptogr., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Tenth Australasian Information Security Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Proceedings of the Practical Signcryption, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
Adv. Math. Commun., 2007
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Proceedings of the Topics in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Finite Fields Their Appl., 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
2005
Proceedings of the Public Key Cryptography, 2005
2004
Appl. Algebra Eng. Commun. Comput., 2004
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Topics in Cryptology, 2001
2000
Proceedings of the Information Security, Third International Workshop, 2000