Stephan Krenn
Orcid: 0000-0003-2835-9093
According to our database1,
Stephan Krenn
authored at least 76 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the 22nd International Conference on Security and Cryptography, 2025
Protecting Privacy in Federated Time Series Analysis: A Pragmatic Technology Review for Application Developers.
Proceedings of the 15th International Conference on Cloud Computing and Services Science, 2025
2024
Comput. Secur., January, 2024
Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications.
IACR Cryptol. ePrint Arch., 2024
Beyond selective disclosure: Extending distributed p-ABC implementations by commit-and-prove techniques.
Comput. Networks, 2024
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024
NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber Defence.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Entropy, February, 2023
ERCIM News, 2023
RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
A Verifiable Multiparty Computation Solver for the Assignment Problem and Applications to Air Traffic Management.
CoRR, 2022
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Proceedings of the 1st International Workshop on Data Economy, 2022
A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022
KRAKEN: A Secure, Trusted, Regulatory-Compliant, and Privacy-Preserving Data Sharing Platform.
Proceedings of the Data Spaces - Design, 2022
2021
Privacy-Preserving Identity Management and Applications to Academic Degree Verification.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Comput. Complex., 2016
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016
Proceedings of the Security Protocols XXIV, 2016
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
Proceedings of the Computer Security, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
IACR Cryptol. ePrint Arch., 2008