Bonsai trees, or how to delegate a lattice basis D Cash, D Hofheinz, E Kiltz, C Peikert Journal of cryptology 25, 601-639, 2012 | 1102 | 2012 |
A modular analysis of the Fujisaki-Okamoto transformation D Hofheinz, K Hövelmanns, E Kiltz Theory of Cryptography Conference, 341-371, 2017 | 588 | 2017 |
Secure hybrid encryption from weakened key encapsulation D Hofheinz, E Kiltz Annual International Cryptology Conference, 553-571, 2007 | 362 | 2007 |
Possibility and impossibility results for encryption and commitment secure under selective opening M Bellare, D Hofheinz, S Yilek Annual International Conference on the Theory and Applications of …, 2009 | 274 | 2009 |
Tightly secure signatures and public-key encryption D Hofheinz, T Jager Designs, Codes and Cryptography 80, 29-61, 2016 | 203 | 2016 |
Multicomponent reactions provide key molecules for secret communication AC Boukis, K Reiter, M Frölich, D Hofheinz, MAR Meier Nature communications 9 (1), 1439, 2018 | 183 | 2018 |
Programmable hash functions and their applications D Hofheinz, E Kiltz Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 178 | 2008 |
Bounded key-dependent message security B Barak, I Haitner, D Hofheinz, Y Ishai Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 152 | 2010 |
Practical chosen ciphertext secure encryption from factoring D Hofheinz, E Kiltz Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 133 | 2009 |
Obfuscation for cryptographic purposes D Hofheinz, J Malone-Lee, M Stam Journal of Cryptology 23, 121-168, 2010 | 131 | 2010 |
Non-interactive key exchange ESV Freire, D Hofheinz, E Kiltz, KG Paterson Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013 | 129 | 2013 |
A practical attack on some braid group based cryptographic primitives D Hofheinz, R Steinwandt Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002 | 127 | 2002 |
Tightly CCA-secure encryption without pairings R Gay, D Hofheinz, E Kiltz, H Wee Annual International Conference on the Theory and Applications of …, 2016 | 119 | 2016 |
GNUC: A new universal composability framework D Hofheinz, V Shoup Journal of Cryptology 28 (3), 423-508, 2015 | 116 | 2015 |
Tightly-secure authenticated key exchange C Bader, D Hofheinz, T Jager, E Kiltz, Y Li Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 113 | 2015 |
Programmable hash functions in the multilinear setting ESV Freire, D Hofheinz, KG Paterson, C Striecks Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 110 | 2013 |
The group of signed quadratic residues and applications D Hofheinz, E Kiltz Annual International Cryptology Conference, 637-653, 2009 | 110 | 2009 |
Bounded CCA2-secure encryption R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ... Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007 | 110 | 2007 |
All-but-many lossy trapdoor functions D Hofheinz Annual International Conference on the Theory and Applications of …, 2012 | 93 | 2012 |
Encryption schemes secure against chosen-ciphertext selective opening attacks S Fehr, D Hofheinz, E Kiltz, H Wee Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 93 | 2010 |