Susan Hohenberger
According to our database1,
Susan Hohenberger
authored at least 57 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2015
IEEE Secur. Priv., 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
2006
PhD thesis, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
Proceedings of the Network and Distributed System Security Symposium, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
2003
Proceedings of the Computing and Combinatorics, 9th Annual International Conference, 2003