Sebastian Ramacher

Orcid: 0000-0003-1957-3725

Affiliations:
  • AIT Austrian Institute of Technology, Vienna, Austria


According to our database1, Sebastian Ramacher authored at least 48 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Constant-Size Inner Product Arguments for Group-Scalar Relations, Dynamic Threshold VRFs, and More.
IACR Cryptol. ePrint Arch., 2025

Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication.
IACR Cryptol. ePrint Arch., 2025

Commitment Schemes from OWFs with Applications to Quantum Oblivious Transfer.
Entropy, 2025

Seamless Post-Quantum Transition: Agile and Efficient Encryption for Data-at-Rest.
Proceedings of the 22nd International Conference on Security and Cryptography, 2025


Leap: A Fast, Lattice-Based OPRF with Application to Private Set Intersection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Shorter, Tighter, FAESTer: Optimizations and Improved (QROM) Analysis for VOLE-in-the-Head Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.
IACR Cryptol. ePrint Arch., 2024

Circuit-Succinct Universally-Composable NIZKs with Updatable CRS.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

OPRFs from Isogenies: Designs and Analysis.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable.
IACR Cryptol. ePrint Arch., 2023

Outsourced Computations Maintaining Confidentiality and Authenticity.
ERCIM News, 2023

Muckle+: End-to-End Hybrid Authenticated Key Exchanges.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

Optimizing 0-RTT Key Exchange with Full Forward Security.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

Key Management Systems for Large-Scale Quantum Key Distribution Networks.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Quantum-resistant End-to-End Secure Messaging and Email Communication.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
(Inner-Product) Functional Encryption with Updatable Ciphertexts.
IACR Cryptol. ePrint Arch., 2022

Extending Expressive Access Policies with Privacy Features.
Proceedings of the IEEE International Conference on Trust, 2022

KRAKEN: a privacy-preserving data market for authentic data.
Proceedings of the 1st International Workshop on Data Economy, 2022

KRAKEN: A Secure, Trusted, Regulatory-Compliant, and Privacy-Preserving Data Sharing Platform.
Proceedings of the Data Spaces - Design, 2022

2021
KRAKEN - Brokerage and Market Platform for Personal Data.
ERCIM News, 2021

Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Updatable Signatures and Message Authentication Codes.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications.
Proceedings of the Financial Cryptography and Data Security, 2021


Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions.
Proceedings of the Computer Security - ESORICS 2021, 2021

Multi-party Revocation in Sovrin: Performance through Distributed Trust.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Issuer-Hiding Attribute-Based Credentials.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Privacy-Preserving Analytics for Data Markets Using MPC.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

Efficient FPGA Implementations of LowMC and Picnic.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Short-Lived Forward-Secure Delegation for TLS.
Proceedings of the CCSW'20, 2020

Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
IACR Cryptol. ePrint Arch., 2019

Selective End-To-End Data-Sharing in the Cloud.
Proceedings of the Information Systems Security - 15th International Conference, 2019

Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Revisiting User Privacy for Certificate Transparency.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Feistel Structures for MPC, and More.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation.
Proceedings of the Provable Security, 2018

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

2017
Improvements to the Linear Layer of LowMC: A Faster Picnic.
IACR Cryptol. ePrint Arch., 2017

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation.
Proceedings of the Financial Cryptography and Data Security, 2017

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Digital Signatures from Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2016


  Loading...