Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ... Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 1227 | 2005 |
Bonsai trees, or how to delegate a lattice basis D Cash, D Hofheinz, E Kiltz, C Peikert Journal of cryptology 25 (4), 601-639, 2012 | 1086 | 2012 |
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ... 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 353-367, 2018 | 888 | 2018 |
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft Theory of Cryptography Conference, 285-304, 2006 | 588 | 2006 |
A modular analysis of the Fujisaki-Okamoto transformation D Hofheinz, K Hövelmanns, E Kiltz Theory of Cryptography Conference, 341-371, 2017 | 579 | 2017 |
Crystals-dilithium: A lattice-based digital signature scheme L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, P Schwabe, G Seiler, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 238-268, 2018 | 542 | 2018 |
An algebraic framework for Diffie–Hellman assumptions A Escala, G Herold, E Kiltz, C Ràfols, J Villar Journal of cryptology 30, 242-288, 2017 | 406 | 2017 |
The twin Diffie–Hellman problem and applications D Cash, E Kiltz, V Shoup Journal of Cryptology 22, 470-504, 2009 | 388 | 2009 |
Secure hybrid encryption from weakened key encapsulation D Hofheinz, E Kiltz Annual International Cryptology Conference, 553-571, 2007 | 366 | 2007 |
Chosen-ciphertext security from tag-based encryption E Kiltz Theory of Cryptography Conference, 581-600, 2006 | 314 | 2006 |
The algebraic group model and its applications G Fuchsbauer, E Kiltz, J Loss Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 311 | 2018 |
CRYSTALS-Kyber algorithm specifications and supporting documentation R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ... NIST PQC Round 2 (4), 1-43, 2019 | 304 | 2019 |
Crystals-dilithium V Lyubashevsky, L Ducas, E Kiltz, T Lepoint, P Schwabe, G Seiler, ... Algorithm Specifications and Supporting Documentation, 2020 | 215 | 2020 |
A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model E Kiltz, V Lyubashevsky, C Schaffner Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 208 | 2018 |
Leakage-resilient signatures S Faust, E Kiltz, K Pietrzak, GN Rothblum Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 179 | 2010 |
Programmable hash functions and their applications D Hofheinz, E Kiltz Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 177 | 2008 |
Crystals-kyber P Schwabe, R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, ... National Institute of Standards and Technology, Tech. Rep, 2020 | 159 | 2020 |
On the generic construction of identity-based signatures with additional properties D Galindo, J Herranz, E Kiltz Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 152 | 2006 |
Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman E Kiltz International Workshop on Public Key Cryptography, 282-297, 2007 | 150 | 2007 |
On the security of two-round multi-signatures M Drijvers, K Edalatnejad, B Ford, E Kiltz, J Loss, G Neven, I Stepanovs 2019 IEEE Symposium on Security and Privacy (SP), 1084-1101, 2019 | 142 | 2019 |