关注
Lucjan Hanzlik
Lucjan Hanzlik
CISPA, Saarland University, Saarland Informatics Campus
在 cispa.saarland 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Mlcapsule: Guarded offline deployment of machine learning as a service
L Hanzlik, Y Zhang, K Grosse, A Salem, M Augustin, M Backes, M Fritz
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
1172021
Ring signatures: logarithmic-size, no setup—from standard assumptions
M Backes, N Döttling, L Hanzlik, K Kluczniak, J Schneider
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
632019
Single secret leader election
D Boneh, S Eskandarian, L Hanzlik, N Greco
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
582020
With a little help from my friends: Constructing practical anonymous credentials
L Hanzlik, D Slamanig
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
462021
Membership privacy for fully dynamic group signatures
M Backes, L Hanzlik, J Schneider-Bensch
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
372019
{simTPM}: User-centric {TPM} for Mobile Devices
D Chakraborty, L Hanzlik, S Bugiel
28th USENIX Security Symposium (USENIX Security 19), 533-550, 2019
372019
Signatures with flexible public key: Introducing equivalence classes for public keys
M Backes, L Hanzlik, K Kluczniak, J Schneider
International Conference on the Theory and Application of Cryptology and …, 2018
322018
Token meets wallet: Formalizing privacy and revocation for FIDO2
L Hanzlik, J Loss, B Wagner
2023 IEEE Symposium on Security and Privacy (SP), 1491-1508, 2023
252023
PI-cut-choo and friends: Compact blind signatures via parallel instance cut-and-choose and more
R Chairattana-Apirom, L Hanzlik, J Loss, A Lysyanskaya, B Wagner
Annual International Cryptology Conference, 3-31, 2022
232022
Simplified PACE| AA Protocol
L Hanzlik, Ł Krzywiecki, M Kutyłowski
International Conference on Information Security Practice and Experience …, 2013
212013
Thermal Imaging Attacks on Keypad Security Systems.
W Wodo, L Hanzlik
SECRYPT, 458-464, 2016
202016
McFly: verifiable encryption to the future made practical
N Döttling, L Hanzlik, B Magri, S Wohnig
International Conference on Financial Cryptography and Data Security, 252-269, 2023
182023
Controlled randomness–a defense against backdoors in cryptographic devices
L Hanzlik, K Kluczniak, M Kutyłowski
Paradigms in Cryptology–Mycrypt 2016. Malicious and Exploratory Cryptology …, 2017
162017
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup
M Backes, L Hanzlik, A Herzberg, A Kate, I Pryvalov
IACR International Workshop on Public Key Cryptography, 286-313, 2019
152019
Rai-choo! Evolving blind signatures to the next level
L Hanzlik, J Loss, B Wagner
Annual International Conference on the Theory and Applications of …, 2023
132023
How not to handle keys: Timing attacks on FIDO authenticator privacy
M Kepkowski, L Hanzlik, I Wood, MA Kaafar
arXiv preprint arXiv:2205.08071, 2022
132022
Feido: Recoverable FIDO2 tokens using electronic ids
F Schwarz, K Do, G Heide, L Hanzlik, C Rossow
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
122022
Mutual restricted identification
L Hanzlik, K Kluczniak, M Kutyłowski, Ł Krzywiecki
Public Key Infrastructures, Services and Applications: 10th European …, 2014
112014
A short paper on blind signatures from knowledge assumptions
L Hanzlik, K Kluczniak
International Conference on Financial Cryptography and Data Security, 535-543, 2016
102016
Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version).
M Backes, L Hanzlik, K Kluczniak, J Schneider
IACR Cryptol. ePrint Arch. 2018, 191, 2018
92018
系统目前无法执行此操作,请稍后再试。
文章 1–20