关注
Anja Lehmann
Anja Lehmann
Hasso Plattner Institute, University of Potsdam
在 hpi.de 的电子邮件经过验证
标题
引用次数
引用次数
年份
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
5412011
Distributed single sign-on
J Camenisch, Y Gilad, A Lehmann, G Neven
US Patent 9,705,872, 2017
1822017
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1772009
Anonymous attestation using the strong diffie hellman assumption revisited
J Camenisch, M Drijvers, A Lehmann
Trust and Trustworthy Computing: 9th International Conference, TRUST 2016 …, 2016
1322016
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1182010
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
1032010
The wonderful world of global random oracles
J Camenisch, M Drijvers, T Gagliardoni, A Lehmann, G Neven
Annual International Conference on the Theory and Applications of …, 2018
1002018
Updatable encryption with post-compromise security
A Lehmann, B Tackmann
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
892018
Universally composable direct anonymous attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
892016
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation
J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian
2017 IEEE Symposium on Security and Privacy (SP), 901-920, 2017
762017
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
752012
Optimal distributed password verification
J Camenisch, A Lehmann, G Neven
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
732015
Formal treatment of privacy-enhancing credential systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
International Conference on Selected Areas in Cryptography, 3-24, 2015
692015
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ...
Policies and Research in Identity Management: Third IFIP WG 11.6 Working …, 2013
662013
Memento: How to reconstruct your secrets from a single password in a hostile environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
642014
Short threshold dynamic group signatures
J Camenisch, M Drijvers, A Lehmann, G Neven, P Towa
International conference on security and cryptography for networks, 401-423, 2020
562020
(R)CCA Secure Updatable Encryption with Integrity Protection
M Klooß, A Lehmann, A Rupp
Eurocrypt, 2019
552019
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
532010
D2. 1 architecture for attribute-based credential technologies
J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ...
Deliverable, ABC4Trust EU Project, 2011
442011
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
432020
系统目前无法执行此操作,请稍后再试。
文章 1–20