Bonsai Trees, or How to Delegate a Lattice BasisOptimal Security Proofs for Full Domain Hash, RevisitedPublic-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable GroupsOn the One-Per-Message Unforgeability of (EC)DSA and Its VariantsMemory-Tight ReductionsOn the Provable Security of (EC)DSA SignaturesStandard Security Does Imply Security Against Selective Opening for Markov DistributionsTwo-Round Man-in-the-Middle Security from LPNDigital Signatures from Strong RSA without Prime GenerationOn the Selective Opening Security of Practical Public-Key Encryption SchemesQuasi-Adaptive NIZK for Linear Subspaces RevisitedStructure-Preserving Signatures from Standard Assumptions, RevisitedSubtleties in the Definition of IND-CCA: When and How Should Challenge Decryption Be Disallowed?Tightly-Secure Authenticated Key ExchangeTightly-Secure Signatures from Chameleon Hash Functions(Hierarchical) Identity-Based Encryption from Affine Message AuthenticationSimple Chosen-Ciphertext Security from Low-Noise LPNAn Algebraic Framework for Diffie-Hellman AssumptionsDigital Signatures with Minimal Overhead from Indifferentiable Random Invertible FunctionsMore Constructions of Lossy and Correlation-Secure Trapdoor FunctionsNon-Interactive Key ExchangePractical Chosen Ciphertext Secure Encryption from FactoringBonsai Trees, or How to Delegate a Lattice BasisCertifying RSADDH-Like Assumptions Based on Extension RingsIdentity-Based (Lossy) Trapdoor Functions and ApplicationsLapin: An Efficient Authentication Protocol Based on Ring-LPNMessage Authentication, RevisitedProgrammable Hash Functions and Their ApplicationsEfficient Authentication from Hard Learning ProblemsShort Signatures from Weaker AssumptionsA Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search ProblemsAdaptive Trapdoor Functions and Chosen-Ciphertext SecurityChosen Ciphertext Security with Optimal Ciphertext OverheadEfficient hybrid encryption from ID-based encryptionEncryption Schemes Secure against Chosen-Ciphertext Selective Opening AttacksInstantiability of RSA-OAEP under Chosen-Plaintext AttackLeakage Resilient ElGamal EncryptionLeakage-Resilient SignaturesMore Constructions of Lossy and Correlation-Secure Trapdoor Functions
P50
Q26215797-255a08fb-4000-6e55-7c2e-2295799d7179Q56475248-E9635EFD-F7E9-4F82-8D90-1A80D55EB8FCQ59163620-449B010A-4BBD-41C7-8016-DE80954C73CBQ59163625-781DB689-C75E-462B-966D-CB56F0703478Q59163630-C460B70A-3413-496A-8281-3BB13894D6DFQ59163633-EA1A3C67-66B8-4C50-AF53-8411FDBE7FC9Q59163637-412D4635-45D1-472D-9E5F-928223FE4416Q59163640-30EAFC4D-7882-4BD5-9D55-D8F63843FD08Q59163644-51A5DE4D-FE77-4E0E-A8F8-CE27F0D9DD1CQ59163647-EB5648B2-DB87-4893-8914-F5A30C09F965Q59163651-676DBD60-37E9-4F29-B2D4-F2C17005E8CBQ59163658-686A41CB-1797-46FD-AF0A-B0C8EEC0B0D1Q59163661-BBC906B7-41E8-4BA3-BB2F-915FED9B9078Q59163663-44379B4D-8724-4CE1-A38B-8B69446B2997Q59163666-0DC47496-0929-4239-AC1F-B5DAD1D3C612Q59163671-03F0FA8E-042A-4FBF-BB9C-8131C3862C66Q59163673-FE7481A6-9984-4790-B119-A55DEE81822AQ59163676-39367AAD-2551-4681-94CC-DC4E4BCDA521Q59163678-F182B72A-548B-47DF-8973-F5D744C86CBFQ59163679-57B55B7A-70C6-4615-ABA9-2A602C610DFAQ59163680-34F0808E-2D2D-4A61-B07A-227AD0764A11Q59163682-AF78CF77-5EB1-4817-8BB7-B14B010FD203Q59163683-ACF9CCED-E31F-4F0E-A67F-C92391378709Q59163684-553CC05C-2150-4158-8E08-2D827EBF2119Q59163686-A447F052-B1D1-46C9-A87F-CFD5578570A7Q59163688-4519E592-4528-41F6-A591-91D0B3BAFC95Q59163689-C481F6E1-158E-4680-BDE2-11BCF5D0FA33Q59163690-3EBD881D-1003-4616-8110-94E1EF016A31Q59163693-764FF84A-5285-4E77-938E-D761C49D0090Q59163696-D41038CE-2D69-42AB-9177-B7E22B49A6A0Q59163697-10519335-798B-46C7-B366-C7E08618EC9CQ59163699-D737901A-8C74-4606-B886-A4BE265EA807Q59163700-02B60DCF-DB95-4723-9846-CAAAF0AAAB82Q59163701-62DEA296-6B14-40FB-AC71-D4F39A957544Q59163702-117A2804-DD33-4E28-B4AD-D61FA260B91FQ59163704-9429924C-FA90-4103-8C65-9C5053C5B202Q59163705-E29E6AEE-3394-4CC2-8F42-F5A65A41661AQ59163707-E86CB693-6286-48E9-8158-A10553EB02A3Q59163708-A4C1B062-6D34-406D-83AC-593E54138D57Q59163709-CEC1B6D2-617E-4122-9FDB-519CB4E3B9FF
P50
description
Duits wiskundige
@nl
German mathematician
@en
German mathematician
@en-ca
German mathematician
@en-gb
Saksamaa matemaatik
@et
deutscher Mathematiker und Hochschullehrer
@de
matematician german
@ro
matematico tedesco
@it
matematikan gjerman
@sq
matemàtic alemany
@ca
name
Eike Kiltz
@af
Eike Kiltz
@an
Eike Kiltz
@ast
Eike Kiltz
@bar
Eike Kiltz
@br
Eike Kiltz
@ca
Eike Kiltz
@co
Eike Kiltz
@cs
Eike Kiltz
@cy
Eike Kiltz
@da
type
label
Eike Kiltz
@af
Eike Kiltz
@an
Eike Kiltz
@ast
Eike Kiltz
@bar
Eike Kiltz
@br
Eike Kiltz
@ca
Eike Kiltz
@co
Eike Kiltz
@cs
Eike Kiltz
@cy
Eike Kiltz
@da
prefLabel
Eike Kiltz
@af
Eike Kiltz
@an
Eike Kiltz
@ast
Eike Kiltz
@bar
Eike Kiltz
@br
Eike Kiltz
@ca
Eike Kiltz
@co
Eike Kiltz
@cs
Eike Kiltz
@cy
Eike Kiltz
@da
P106
P214
P227
P1412
P1559
Eike Kiltz
@de
P21
P213
0000 0000 1554 6226
P214
P227
P2456
k/EikeKiltz
P31
P4955
P496
0000-0003-1178-048X
P512
P569
1975-01-01T00:00:00Z