default search action
Eike Kiltz
Person information
- affiliation: Ruhr University Bochum, Germany
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c94]Phillip Gajland, Jonas Janneck, Eike Kiltz:
Ring Signatures for Deniable AKEM: Gandalf's Fellowship. CRYPTO (1) 2024: 305-338 - [i77]Phillip Gajland, Jonas Janneck, Eike Kiltz:
Ring Signatures for Deniable AKEM: Gandalf's Fellowship. IACR Cryptol. ePrint Arch. 2024: 890 (2024) - [i76]Phillip Gajland, Jonas Janneck, Eike Kiltz:
A Closer Look at Falcon. IACR Cryptol. ePrint Arch. 2024: 1769 (2024) - 2023
- [c93]Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp:
The Pre-Shared Key Modes of HPKE. ASIACRYPT (6) 2023: 329-360 - [c92]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe:
Post-Quantum Multi-Recipient Public Key Encryption. CCS 2023: 1108-1122 - [c91]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV. CT-RSA 2023: 645-671 - [c90]Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh:
A Thorough Treatment of Highly-Efficient NTRU Instantiations. Public Key Cryptography (1) 2023: 65-94 - [c89]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. Public Key Cryptography (1) 2023: 406-435 - [c88]Dominik Hartmann, Eike Kiltz:
Limits in the Provable Security of ECDSA Signatures. TCC (4) 2023: 279-309 - [i75]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV. IACR Cryptol. ePrint Arch. 2023: 115 (2023) - [i74]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. IACR Cryptol. ePrint Arch. 2023: 186 (2023) - [i73]Dominik Hartmann, Eike Kiltz:
Limits in the Provable Security of ECDSA Signatures. IACR Cryptol. ePrint Arch. 2023: 914 (2023) - [i72]Joël Alwen, Jonas Janneck, Eike Kiltz, Benjamin Lipp:
The Pre-Shared Key Modes of HPKE. IACR Cryptol. ePrint Arch. 2023: 1480 (2023) - 2022
- [c87]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. ASIACRYPT (2) 2022: 36-66 - [c86]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk:
Server-Aided Continuous Group Key Agreement. CCS 2022: 69-82 - [c85]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. CRYPTO (2) 2022: 699-728 - [p2]Dennis Hofheinz, Eike Kiltz:
Scalable Cryptography. Algorithms for Big Data 2022: 169-178 - [e3]Eike Kiltz, Vinod Vaikuntanathan:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13747, Springer 2022, ISBN 978-3-031-22317-4 [contents] - [e2]Eike Kiltz, Vinod Vaikuntanathan:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13748, Springer 2022, ISBN 978-3-031-22364-8 [contents] - [e1]Eike Kiltz, Vinod Vaikuntanathan:
Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13749, Springer 2022, ISBN 978-3-031-22367-9 [contents] - [d3]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Zenodo, 2022 - [i71]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. IACR Cryptol. ePrint Arch. 2022: 770 (2022) - [i70]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk, Peter Schwabe:
Post-Quantum Multi-Recipient Public Key Encryption. IACR Cryptol. ePrint Arch. 2022: 1046 (2022) - [i69]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. IACR Cryptol. ePrint Arch. 2022: 1230 (2022) - 2021
- [c84]Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler:
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing. CCS 2021: 2722-2737 - [c83]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. CRYPTO (4) 2021: 670-700 - [c82]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. EUROCRYPT (1) 2021: 87-116 - [c81]Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. EUROCRYPT (1) 2021: 117-146 - [c80]Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu:
On the Impossibility of Purely Algebraic Signatures. TCC (3) 2021: 317-349 - [d2]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Zenodo, 2021 - [i68]Nico Döttling, Dominik Hartmann, Dennis Hofheinz, Eike Kiltz, Sven Schäge, Bogdan Ursu:
On the Impossibility of Short Algebraic Signatures. IACR Cryptol. ePrint Arch. 2021: 738 (2021) - [i67]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. IACR Cryptol. ePrint Arch. 2021: 863 (2021) - [i66]Julien Duman, Eike Kiltz, Kathrin Hövelmanns, Vadim Lyubashevsky, Gregor Seiler:
Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing. IACR Cryptol. ePrint Arch. 2021: 1351 (2021) - [i65]Julien Duman, Kathrin Hövelmanns, Eike Kiltz, Vadim Lyubashevsky, Gregor Seiler, Dominique Unruh:
A Thorough Treatment of Highly-Efficient NTRU Instantiations. IACR Cryptol. ePrint Arch. 2021: 1352 (2021) - [i64]Joël Alwen, Dominik Hartmann, Eike Kiltz, Marta Mularczyk:
Server-Aided Continuous Group Key Agreement. IACR Cryptol. ePrint Arch. 2021: 1456 (2021) - 2020
- [c79]Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen:
Lattice-Based Blind Signatures, Revisited. CRYPTO (2) 2020: 500-529 - [c78]Benedikt Auerbach, Federico Giacon, Eike Kiltz:
Everybody's a Target: Scalability in Public-Key Encryption. EUROCRYPT (3) 2020: 475-506 - [c77]Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh:
Generic Authenticated Key Exchange in the Quantum Random Oracle Model. Public Key Cryptography (2) 2020: 389-422 - [d1]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Zenodo, 2020 - [i63]Eduard Hauck, Eike Kiltz, Julian Loss, Ngoc Khanh Nguyen:
Lattice-Based Blind Signatures, Revisited. IACR Cryptol. ePrint Arch. 2020: 769 (2020) - [i62]Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. IACR Cryptol. ePrint Arch. 2020: 1279 (2020) - [i61]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. IACR Cryptol. ePrint Arch. 2020: 1499 (2020)
2010 – 2019
- 2019
- [j23]Benedikt Auerbach, Mary Shnayien, Eike Kiltz, Anna Tuschling:
Zwei Betrachtungen von Sicherheit und Privatheit nach Snowden. Datenschutz und Datensicherheit 43(11): 706-712 (2019) - [c76]Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. CT-RSA 2019: 230-250 - [c75]Eduard Hauck, Eike Kiltz, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. EUROCRYPT (3) 2019: 345-375 - [c74]Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs:
On the Security of Two-Round Multi-Signatures. IEEE Symposium on Security and Privacy 2019: 1084-1101 - [i60]Eduard Hauck, Eike Kiltz, Julian Loss:
A Modular Treatment of Blind Signatures from Identification Schemes. IACR Cryptol. ePrint Arch. 2019: 260 (2019) - [i59]Benedikt Auerbach, Federico Giacon, Eike Kiltz:
Everybody's a Target: Scalability in Public-Key Encryption. IACR Cryptol. ePrint Arch. 2019: 364 (2019) - 2018
- [j22]Saqib A. Kakvi, Eike Kiltz:
Optimal Security Proofs for Full Domain Hash, Revisited. J. Cryptol. 31(1): 276-306 (2018) - [j21]Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS-Dilithium: A Lattice-Based Digital Signature Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 238-268 (2018) - [c73]Georg Fuchsbauer, Eike Kiltz, Julian Loss:
The Algebraic Group Model and its Applications. CRYPTO (2) 2018: 33-62 - [c72]Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. EUROCRYPT (3) 2018: 552-586 - [c71]Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. EuroS&P 2018: 353-367 - [c70]Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-user Setting, Revisited. Public Key Cryptography (1) 2018: 159-189 - [c69]Benedikt Auerbach, Mihir Bellare, Eike Kiltz:
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. Public Key Cryptography (1) 2018: 348-377 - [i58]Benedikt Auerbach, Mihir Bellare, Eike Kiltz:
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups. IACR Cryptol. ePrint Arch. 2018: 23 (2018) - [i57]Kathrin Hövelmanns, Eike Kiltz, Sven Schäge, Dominique Unruh:
Generic Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2018: 928 (2018) - [i56]Benedikt Auerbach, Eike Kiltz, Bertram Poettering, Stefan Schoenen:
Lossy Trapdoor Permutations with Improved Lossiness. IACR Cryptol. ePrint Arch. 2018: 1183 (2018) - 2017
- [j20]Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge Luis Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. J. Cryptol. 30(1): 242-288 (2017) - [j19]Eike Kiltz, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP Under Chosen-Plaintext Attack. J. Cryptol. 30(3): 889-919 (2017) - [j18]Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain:
Efficient Authentication from Hard Learning Problems. J. Cryptol. 30(4): 1238-1275 (2017) - [c68]Eike Kiltz, Julian Loss, Jiaxin Pan:
Tightly-Secure Signatures from Five-Move Identification Protocols. ASIACRYPT (3) 2017: 68-94 - [c67]Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz:
Memory-Tight Reductions. CRYPTO (1) 2017: 101-132 - [c66]Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz:
A Modular Analysis of the Fujisaki-Okamoto Transformation. TCC (1) 2017: 341-371 - [c65]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and Its Variants. TCC (2) 2017: 519-534 - [i55]Dennis Hofheinz, Kathrin Hövelmanns, Eike Kiltz:
A Modular Analysis of the Fujisaki-Okamoto Transformation. IACR Cryptol. ePrint Arch. 2017: 604 (2017) - [i54]Eike Kiltz, Julian Loss:
The Algebraic Group Model and its Applications. IACR Cryptol. ePrint Arch. 2017: 620 (2017) - [i53]Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Damien Stehlé:
CRYSTALS - Kyber: a CCA-secure module-lattice-based KEM. IACR Cryptol. ePrint Arch. 2017: 634 (2017) - [i52]Benedikt Auerbach, David Cash, Manuel Fersch, Eike Kiltz:
Memory-Tight Reductions. IACR Cryptol. ePrint Arch. 2017: 675 (2017) - [i51]Federico Giacon, Eike Kiltz, Bertram Poettering:
Hybrid Encryption in a Multi-User Setting, Revisited. IACR Cryptol. ePrint Arch. 2017: 843 (2017) - [i50]Eike Kiltz, Julian Loss, Jiaxin Pan:
Tightly-Secure Signatures from Five-Move Identification Protocols. IACR Cryptol. ePrint Arch. 2017: 870 (2017) - [i49]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the One-Per-Message Unforgeability of (EC)DSA and its Variants. IACR Cryptol. ePrint Arch. 2017: 890 (2017) - [i48]Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. IACR Cryptol. ePrint Arch. 2017: 916 (2017) - 2016
- [j17]Felix Heuer, Tibor Jager, Sven Schäge, Eike Kiltz:
Selective opening security of practical public-key encryption schemes. IET Inf. Secur. 10(6): 304-318 (2016) - [c64]Manuel Fersch, Eike Kiltz, Bertram Poettering:
On the Provable Security of (EC)DSA Signatures. CCS 2016: 1651-1662 - [c63]Eike Kiltz, Daniel Masny, Jiaxin Pan:
Optimal Security Proofs for Signatures from Identification Schemes. CRYPTO (2) 2016: 33-61 - [c62]Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly CCA-Secure Encryption Without Pairings. EUROCRYPT (1) 2016: 1-27 - [c61]David Cash, Eike Kiltz, Stefano Tessaro:
Two-Round Man-in-the-Middle Security from LPN. TCC (A1) 2016: 225-248 - [c60]Georg Fuchsbauer, Felix Heuer, Eike Kiltz, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. TCC (A1) 2016: 282-305 - [i47]Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly Secure CCA-Secure Encryption without Pairings. IACR Cryptol. ePrint Arch. 2016: 94 (2016) - [i46]Eike Kiltz, Daniel Masny, Jiaxin Pan:
Optimal Security Proofs for Signatures from Identification Schemes. IACR Cryptol. ePrint Arch. 2016: 191 (2016) - [i45]Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge:
On the Selective Opening Security of Practical Public-Key Encryption Schemes. IACR Cryptol. ePrint Arch. 2016: 342 (2016) - 2015
- [j16]Mihir Bellare, Dennis Hofheinz, Eike Kiltz:
Subtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed? J. Cryptol. 28(1): 29-48 (2015) - [c59]Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. CRYPTO (2) 2015: 275-295 - [c58]Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. EUROCRYPT (2) 2015: 101-128 - [c57]Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge:
On the Selective Opening Security of Practical Public-Key Encryption Schemes. Public Key Cryptography 2015: 27-51 - [c56]David Cash, Rafael Dowsley, Eike Kiltz:
Digital Signatures from Strong RSA without Prime Generation. Public Key Cryptography 2015: 217-235 - [c55]Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan:
Tightly-Secure Signatures from Chameleon Hash Functions. Public Key Cryptography 2015: 256-279 - [c54]Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li:
Tightly-Secure Authenticated Key Exchange. TCC (1) 2015: 629-658 - [i44]Eike Kiltz, Hoeteck Wee:
Quasi-Adaptive NIZK for Linear Subspaces Revisited. IACR Cryptol. ePrint Arch. 2015: 216 (2015) - [i43]Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. IACR Cryptol. ePrint Arch. 2015: 401 (2015) - [i42]Eike Kiltz, Jiaxin Pan, Hoeteck Wee:
Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptol. ePrint Arch. 2015: 604 (2015) - [i41]Felix Heuer, Eike Kiltz, Krzysztof Pietrzak:
Standard Security Does Imply Security Against Selective Opening for Markov Distributions. IACR Cryptol. ePrint Arch. 2015: 853 (2015) - [i40]David Cash, Eike Kiltz, Stefano Tessaro:
Two-Round Man-in-the-Middle Security from LPN. IACR Cryptol. ePrint Arch. 2015: 1220 (2015) - 2014
- [c53]Olivier Blazy, Eike Kiltz, Jiaxin Pan:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. CRYPTO (1) 2014: 408-425 - [c52]Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:
Simple Chosen-Ciphertext Security from Low-Noise LPN. Public Key Cryptography 2014: 1-18 - [i39]Olivier Blazy, Eike Kiltz, Jiaxin Pan:
(Hierarchical) Identity-Based Encryption from Affine Message Authentication. IACR Cryptol. ePrint Arch. 2014: 581 (2014) - [i38]Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li:
Tightly-Secure Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2014: 797 (2014) - [i37]Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan:
Tightly-Secure Signatures from Chameleon Hash Functions. IACR Cryptol. ePrint Arch. 2014: 1021 (2014) - 2013
- [j15]David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev:
More Constructions of Lossy and Correlation-Secure Trapdoor Functions. J. Cryptol. 26(1): 39-74 (2013) - [j14]Dennis Hofheinz, Eike Kiltz, Victor Shoup:
Practical Chosen Ciphertext Secure Encryption from Factoring. J. Cryptol. 26(1): 102-118 (2013) - [c51]Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge L. Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. CRYPTO (2) 2013: 129-147 - [c50]Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy:
Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions. CRYPTO (1) 2013: 571-588 - [c49]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. Public Key Cryptography 2013: 254-271 - [i36]Alex Escala, Gottfried Herold, Eike Kiltz, Carla Ràfols, Jorge L. Villar:
An Algebraic Framework for Diffie-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2013: 377 (2013) - 2012
- [j13]Dennis Hofheinz, Eike Kiltz:
Programmable Hash Functions and Their Applications. J. Cryptol. 25(3): 484-527 (2012) - [j12]David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert:
Bonsai Trees, or How to Delegate a Lattice Basis. J. Cryptol. 25(4): 601-639 (2012) - [c48]Saqib A. Kakvi, Eike Kiltz, Alexander May:
Certifying RSA. ASIACRYPT 2012: 404-414 - [c47]Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters:
Identity-Based (Lossy) Trapdoor Functions and Applications. EUROCRYPT 2012: 228-245 - [c46]Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. EUROCRYPT 2012: 355-374 - [c45]Saqib A. Kakvi, Eike Kiltz:
Optimal Security Proofs for Full Domain Hash, Revisited. EUROCRYPT 2012: 537-553 - [c44]Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak:
Lapin: An Efficient Authentication Protocol Based on Ring-LPN. FSE 2012: 346-365 - [c43]Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel:
DDH-Like Assumptions Based on Extension Rings. Public Key Cryptography 2012: 644-661 - [i35]Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. IACR Cryptol. ePrint Arch. 2012: 59 (2012) - [i34]Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy:
Digital Signatures with Minimal Overhead. IACR Cryptol. ePrint Arch. 2012: 658 (2012) - [i33]Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson:
Non-Interactive Key Exchange. IACR Cryptol. ePrint Arch. 2012: 732 (2012) - 2011
- [c42]Dennis Hofheinz, Tibor Jager, Eike Kiltz:
Short Signatures from Weaker Assumptions. ASIACRYPT 2011: 647-666 - [c41]Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi:
Efficient Authentication from Hard Learning Problems. EUROCRYPT 2011: 7-26 - [i32]Dennis Hofheinz, Eike Kiltz:
Programmable Hash Functions and Their Applications. IACR Cryptol. ePrint Arch. 2011: 270 (2011) - [i31]Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel:
DDH-like Assumptions Based on Extension Rings. IACR Cryptol. ePrint Arch. 2011: 280 (2011) - [i30]Dennis Hofheinz, Tibor Jager, Eike Kiltz:
Short Signatures From Weaker Assumptions. IACR Cryptol. ePrint Arch. 2011: 296 (2011) - [i29]Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters:
Identity-Based (Lossy) Trapdoor Functions and Applications. IACR Cryptol. ePrint Arch. 2011: 479 (2011) - [i28]Eike Kiltz, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP under Chosen-Plaintext Attack. IACR Cryptol. ePrint Arch. 2011: 559 (2011) - 2010
- [j11]David Galindo, Javier Herranz, Eike Kiltz:
On the generic construction of identity-based signatures with additional properties. Adv. Math. Commun. 4(4): 453-483 (2010) - [j10]Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz:
Efficient hybrid encryption from ID-based encryption. Des. Codes Cryptogr. 54(3): 205-240 (2010) - [j9]Javier Herranz, Dennis Hofheinz, Eike Kiltz:
Some (in)sufficient conditions for secure hybrid encryption. Inf. Comput. 208(11): 1243-1257 (2010) - [j8]Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 22-33 (2010) - [c40]Eike Kiltz, Krzysztof Pietrzak:
Leakage Resilient ElGamal Encryption. ASIACRYPT 2010: 595-612 - [c39]Eike Kiltz, Adam O'Neill, Adam D. Smith:
Instantiability of RSA-OAEP under Chosen-Plaintext Attack. CRYPTO 2010: 295-313 - [c38]Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. EUROCRYPT 2010: 381-402 - [c37]David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert:
Bonsai Trees, or How to Delegate a Lattice Basis. EUROCRYPT 2010: 523-552 - [c36]Eike Kiltz, Payman Mohassel, Adam O'Neill:
Adaptive Trapdoor Functions and Chosen-Ciphertext Security. EUROCRYPT 2010: 673-692 - [c35]Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup:
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. Public Key Cryptography 2010: 1-18 - [c34]David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev:
More Constructions of Lossy and Correlation-Secure Trapdoor Functions. Public Key Cryptography 2010: 279-295 - [c33]Eike Kiltz:
Cryptographic Protocols from Lattices. ProvSec 2010: 199 - [c32]Ronald Cramer, Dennis Hofheinz, Eike Kiltz:
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. TCC 2010: 146-164 - [c31]Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum:
Leakage-Resilient Signatures. TCC 2010: 343-360 - [i27]Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup:
Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. IACR Cryptol. ePrint Arch. 2010: 33 (2010) - [i26]David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert:
Bonsai Trees, or How to Delegate a Lattice Basis. IACR Cryptol. ePrint Arch. 2010: 591 (2010)
2000 – 2009
- 2009
- [j7]Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, Moti Yung:
The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Inf. Process. Lett. 109(16): 897-901 (2009) - [j6]David Cash, Eike Kiltz, Victor Shoup:
The Twin Diffie-Hellman Problem and Applications. J. Cryptol. 22(4): 470-504 (2009) - [j5]Eike Kiltz, David Galindo:
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Theor. Comput. Sci. 410(47-49): 5093-5111 (2009) - [c30]Dennis Hofheinz, Eike Kiltz:
The Group of Signed Quadratic Residues and Applications. CRYPTO 2009: 637-653 - [c29]Dennis Hofheinz, Eike Kiltz:
Practical Chosen Ciphertext Secure Encryption from Factoring. EUROCRYPT 2009: 313-332 - [c28]Eike Kiltz, Krzysztof Pietrzak:
On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. EUROCRYPT 2009: 389-406 - [c27]Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung:
A New Randomness Extraction Paradigm for Hybrid Encryption. EUROCRYPT 2009: 590-609 - [c26]Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto:
Compact CCA-Secure Encryption for Messages of Arbitrary Length. Public Key Cryptography 2009: 377-392 - [p1]Eike Kiltz, Gregory Neven:
Identity-Based Signatures. Identity-Based Cryptography 2009: 31-44 - [i25]Ronald Cramer, Dennis Hofheinz, Eike Kiltz:
Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems. IACR Cryptol. ePrint Arch. 2009: 142 (2009) - [i24]Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum:
Leakage-Resilient Signatures. IACR Cryptol. ePrint Arch. 2009: 282 (2009) - [i23]David Cash, Dennis Hofheinz, Eike Kiltz:
How to Delegate a Lattice Basis. IACR Cryptol. ePrint Arch. 2009: 351 (2009) - [i22]Mihir Bellare, Dennis Hofheinz, Eike Kiltz:
Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed? IACR Cryptol. ePrint Arch. 2009: 418 (2009) - [i21]David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev:
More Constructions of Lossy and Correlation-Secure Trapdoor Functions. IACR Cryptol. ePrint Arch. 2009: 590 (2009) - 2008
- [j4]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalised key delegation for hierarchical identity-based encryption. IET Inf. Secur. 2(3): 67-78 (2008) - [j3]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. J. Cryptol. 21(3): 350-391 (2008) - [c25]Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. ASIACRYPT 2008: 355-371 - [c24]Dennis Hofheinz, Eike Kiltz:
Programmable Hash Functions and Their Applications. CRYPTO 2008: 21-38 - [c23]Eike Kiltz, Yevgeniy Vahlis:
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. CT-RSA 2008: 221-238 - [c22]Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek:
Public-Key Encryption with Non-interactive Opening. CT-RSA 2008: 239-255 - [c21]David Cash, Eike Kiltz, Victor Shoup:
The Twin Diffie-Hellman Problem and Applications. EUROCRYPT 2008: 127-145 - [i20]Eike Kiltz, Yevgeniy Vahlis:
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. IACR Cryptol. ePrint Arch. 2008: 20 (2008) - [i19]David Cash, Eike Kiltz, Victor Shoup:
The Twin Diffie-Hellman Problem and Applications. IACR Cryptol. ePrint Arch. 2008: 67 (2008) - [i18]Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung:
A New Randomness Extraction Paradigm for Hybrid Encryption. IACR Cryptol. ePrint Arch. 2008: 304 (2008) - [i17]Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto:
Chosen Ciphertext Security with Optimal Ciphertext Overhead. IACR Cryptol. ePrint Arch. 2008: 374 (2008) - 2007
- [c20]Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518 - [c19]Dennis Hofheinz, Eike Kiltz:
Secure Hybrid Encryption from Weakened Key Encapsulation. CRYPTO 2007: 553-571 - [c18]Ronald Cramer, Eike Kiltz, Carles Padró:
A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra. CRYPTO 2007: 613-630 - [c17]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption. ESORICS 2007: 139-154 - [c16]Eike Kiltz:
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Public Key Cryptography 2007: 282-297 - [c15]Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin:
Secure Linear Algebra Using Linearly Recurrent Sequences. TCC 2007: 291-310 - [i16]Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz:
Efficient Hybrid Encryption from ID-Based Encryption. IACR Cryptol. ePrint Arch. 2007: 23 (2007) - [i15]Eike Kiltz:
From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme. IACR Cryptol. ePrint Arch. 2007: 33 (2007) - [i14]Eike Kiltz:
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. IACR Cryptol. ePrint Arch. 2007: 36 (2007) - [i13]Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2007: 221 (2007) - [i12]Dennis Hofheinz, Eike Kiltz:
Secure Hybrid Encryption from Weakened Key Encapsulation. IACR Cryptol. ePrint Arch. 2007: 288 (2007) - 2006
- [j2]Eike Kiltz, Arne Winterhof:
Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem. Discret. Appl. Math. 154(2): 326-336 (2006) - [c14]Eike Kiltz, David Galindo:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. ACISP 2006: 336-347 - [c13]David Galindo, Javier Herranz, Eike Kiltz:
On the Generic Construction of Identity-Based Signatures with Additional Properties. ASIACRYPT 2006: 178-193 - [c12]Eike Kiltz:
On the Limitations of the Spread of an IBE-to-PKE Transformation. Public Key Cryptography 2006: 274-289 - [c11]David Galindo, Eike Kiltz:
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. SCN 2006: 173-185 - [c10]Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft:
Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. TCC 2006: 285-304 - [c9]Eike Kiltz:
Chosen-Ciphertext Security from Tag-Based Encryption. TCC 2006: 581-600 - [i11]Eike Kiltz, Enav Weinreb:
Secure Linear Algebra Using Linearly Recurrent Sequences. Complexity of Boolean Functions 2006 - [i10]Eike Kiltz, David Galindo:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 34 (2006) - [i9]Eike Kiltz:
Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. IACR Cryptol. ePrint Arch. 2006: 122 (2006) - [i8]Javier Herranz, Dennis Hofheinz, Eike Kiltz:
The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure. IACR Cryptol. ePrint Arch. 2006: 207 (2006) - [i7]Javier Herranz, Dennis Hofheinz, Eike Kiltz:
Some (in)sufficient conditions for secure hybrid encryption. IACR Cryptol. ePrint Arch. 2006: 265 (2006) - [i6]David Galindo, Javier Herranz, Eike Kiltz:
On the Generic Construction of Identity-Based Signatures with Additional Properties. IACR Cryptol. ePrint Arch. 2006: 296 (2006) - [i5]Ronald Cramer, Dennis Hofheinz, Eike Kiltz:
A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security. IACR Cryptol. ePrint Arch. 2006: 391 (2006) - 2005
- [j1]Eike Kiltz, Hans Ulrich Simon:
Threshold circuit lower bounds on cryptographic functions. J. Comput. Syst. Sci. 71(2): 185-212 (2005) - [c8]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. CRYPTO 2005: 205-222 - [c7]Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan:
Append-Only Signatures. ICALP 2005: 434-445 - [c6]Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. TCC 2005: 283-302 - [i4]Eike Kiltz:
Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. IACR Cryptol. ePrint Arch. 2005: 66 (2005) - [i3]Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan:
Append-Only Signatures. IACR Cryptol. ePrint Arch. 2005: 124 (2005) - [i2]Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi:
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. IACR Cryptol. ePrint Arch. 2005: 254 (2005) - 2004
- [i1]Eike Kiltz, Gregor Leander, John Malone-Lee:
Secure Computation of the Mean and Related Statistics. IACR Cryptol. ePrint Arch. 2004: 359 (2004) - 2003
- [c5]Eike Kiltz, Hans Ulrich Simon:
Complexity Theoretic Aspects of Some Cryptographic Functions. COCOON 2003: 294-303 - [c4]Eike Kiltz, John Malone-Lee:
A General Construction of IND-CCA2 Secure Public Key Encryption. IMACC 2003: 152-166 - [c3]Eike Kiltz:
On the Representation of Boolean Predicates of the Diffie-Hellman Function. STACS 2003: 223-233 - 2001
- [c2]Eike Kiltz:
A Primitive for Proving the Security of Every Bit and About Universal Hash Functions & Hard Core Bits. FCT 2001: 388-391 - [c1]Eike Kiltz:
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function. INDOCRYPT 2001: 339-350
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint