Follow
Daniel Slamanig
Daniel Slamanig
Verified email at unibw.de - Homepage
Title
Cited by
Cited by
Year
Post-quantum zero-knowledge and signatures from symmetric-key primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017 …, 2017
3712017
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
D Derler, K Samelin, D Slamanig, C Striecks
Network and Distributed System Security Symposium 2019 (NDSS'19), 2019
1772019
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
G Fuchsbauer, C Hanser, D Slamanig
Journal of Cryptology 32 (2), 498-546, 2019
175*2019
Chameleon-Hashes with Ephemeral Trapdoors
J Camenisch, D Derler, S Krenn, HC Pöhls, K Samelin, D Slamanig
IACR International Conference on Practice and Theory of Public-Key …, 2017
168*2017
The Picnic Signature Scheme
M Chase, D Derler, S Goldfeder, J Katz, V Kolesnikov, C Orlandi, ...
Submission to NIST Post-Quantum Cryptography project, 2019
136*2019
Revisiting cryptographic accumulators, additional properties and relations to other primitives
D Derler, C Hanser, D Slamanig
Cryptographers’ Track at the RSA Conference, 127-144, 2015
1302015
Structure-preserving signatures on equivalence classes and their application to anonymous credentials
C Hanser, D Slamanig
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1042014
Practical round-optimal blind signatures in the standard model
G Fuchsbauer, C Hanser, D Slamanig
Advances in Cryptology - CRYPTO 2015, 233-253, 2015
1012015
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
D Derler, K Gellert, T Jager, D Slamanig, C Striecks
Journal of Cryptology 34 (2), 1-59, 2021
992021
Privacy aspects of ehealth
D Slamanig, C Stingl
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
952008
On cloud storage and the cloud of clouds approach
D Slamanig, C Hanser
Internet Technology And Secured Transactions, 2012 International Conference …, 2012
782012
Highly-efficient fully-anonymous dynamic group signatures
D Derler, D Slamanig
2018 ACM Asia Conference on Computer and Communications Security, AsiaCCS …, 2018
71*2018
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives
D Derler, S Ramacher, D Slamanig
International Conference on Post-Quantum Cryptography, 419-440, 2018
622018
A framework for privacy-preserving mobile payment on security enhanced arm trustzone platforms
M Pirker, D Slamanig
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
622012
A general framework for redactable signatures and new constructions
D Derler, HC Pöhls, K Samelin, D Slamanig
International Conference on Information Security and Cryptology, 3-19, 2015
612015
Revisiting proxy re-encryption: Forward secrecy, improved security, and applications
D Derler, S Krenn, T Lorünser, S Ramacher, D Slamanig, C Striecks
IACR International Conference on Practice and Theory of Public-Key …, 2018
59*2018
ARCHISTAR: towards secure and robust cloud based data sharing
T Loruenser, A Happe, D Slamanig
Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th …, 2015
542015
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically
B Abdolmaleki, S Ramacher, D Slamanig
2020 ACM SIGSAC Conference on Computer and Communications Security, CCS 2020, 2020
522020
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
D Derler, D Slamanig
Designs, Codes and Cryptography 87, 1373-1413, 2019
49*2019
With a little help from my friends: Constructing practical anonymous credentials
L Hanzlik, D Slamanig
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
482021
The system can't perform the operation now. Try again later.
Articles 1–20