Follow
Christian Hanser
Title
Cited by
Cited by
Year
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
G Fuchsbauer, C Hanser, D Slamanig
Journal of Cryptology 32, 498-546, 2019
1552019
Revisiting cryptographic accumulators, additional properties and relations to other primitives
D Derler, C Hanser, D Slamanig
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
1302015
Structure-preserving signatures on equivalence classes and their application to anonymous credentials
C Hanser, D Slamanig
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1042014
Practical round-optimal blind signatures in the standard model
G Fuchsbauer, C Hanser, D Slamanig
Annual Cryptology Conference, 233-253, 2015
1012015
On cloud storage and the cloud of clouds approach
D Slamanig, C Hanser
2012 International Conference for Internet Technology and Secured …, 2012
782012
Implementing RLWE-based schemes using an RSA co-processor
MR Albrecht, C Hanser, A Hoeller, T Pöppelmann, F Virdia, A Wallner
Cryptology ePrint Archive, 2018
632018
Blank digital signatures
C Hanser, D Slamanig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
372013
Practical round-optimal blind signatures in the standard model from weaker assumptions
G Fuchsbauer, C Hanser, C Kamath, D Slamanig
International Conference on Security and Cryptography for Networks, 391-408, 2016
362016
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
C Hanser, D Slamanig
SECRYPT 2013, 10th International Conference on Security and Cryptography, 15-26, 2013
292013
A new approach to efficient revocable attribute-based anonymous credentials
D Derler, C Hanser, D Slamanig
IMA International Conference on Cryptography and Coding, 57-74, 2015
262015
Group signatures on mobile devices: Practical experiences
K Potzmader, J Winter, D Hein, C Hanser, P Teufl, L Chen
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
242013
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes.
G Fuchsbauer, C Hanser, D Slamanig
IACR Cryptol. ePrint Arch. 2014, 944, 2014
222014
Verifiably encrypted signatures: security revisited and a new construction
C Hanser, M Rabkin, D Schröder
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
182015
PRISMACLOUD D4. 4: overview of functional and malleable signature schemes
D Demirel, D Derler, C Hanser, H Pöhls, D Slamanig, G Traverso
., 2015
162015
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials.
D Derler, C Hanser, D Slamanig
DBSec 2014 2014, 49-65, 2014
102014
Blank digital signatures: optimization and practical experiences
D Derler, C Hanser, D Slamanig
IFIP International Summer School on Privacy and Identity Management, 201-215, 2014
82014
Towards authenticity and privacy preserving accountable workflows
D Derler, C Hanser, HC Pöhls, D Slamanig
Privacy and Identity Management. Time for a Revolution? 10th IFIP WG 9.2, 9 …, 2016
52016
Warrant-hiding delegation-by-certificate proxy signature schemes
C Hanser, D Slamanig
International Conference on Cryptology in India, 60-77, 2013
52013
Speeding up the fixed-base comb method for faster scalar multiplication on Koblitz curves
C Hanser, C Wagner
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
52013
New trends in elliptic curve cryptography
C Hanser
na, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20