Christian Matt
Christian Matt
E-mail confirmado em - Página inicial
Citado por
Citado por
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory 63 (5), 3277-3305, 2017
Indistinguishability obfuscation without multilinear maps: New paradigms via low degree weak pseudorandomness and security amplification
P Ananth, A Jain, H Lin, C Matt, A Sahai
Annual International Cryptology Conference, 284-332, 2019
How to leverage hardness of constant-degree expanding polynomials over to build
A Jain, H Lin, C Matt, A Sahai
Annual International Conference on the Theory and Applications of …, 2019
Afgjort: A partially synchronous finality layer for blockchains
T Dinsdale-Young, B Magri, C Matt, JB Nielsen, D Tschudi
International Conference on Security and Cryptography for Networks, 24-44, 2020
The one-time pad revisited
C Matt, U Maurer
2013 IEEE International Symposium on Information Theory, 2706-2710, 2013
Augmented secure channels and the goal of the TLS 1.3 record layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
GearBox: Optimal-size shard committees by leveraging the safety-liveness dichotomy
B David, B Magri, C Matt, JB Nielsen, D Tschudi
2022 ACM SIGSAC Conference on Computer and Communications Security, 683-696, 2022
Pseudo flawed-smudging generators and their application to indistinguishability obfuscation
H Lin, C Matt
IACR Cryptology ePrint Archive 2018, 646, 2018
Strengthening access control encryption
C Badertscher, C Matt, U Maurer
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
A definitional framework for functional encryption
C Matt, U Maurer
2015 IEEE 28th Computer Security Foundations Symposium, 217-231, 2015
Formalizing delayed adaptive corruptions and the security of flooding networks
C Matt, JB Nielsen, SE Thomsen
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
Robust authenticated encryption and the limits of symmetric cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
Idealizing identity-based encryption
D Hofheinz, C Matt, U Maurer
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
Practical provably secure flooding for blockchains
CD Liu Zhang, C Matt, U Maurer, G Rito, S Eller Thomsen
Advances in Cryptology–ASIACRYPT 2022 13791, 774-805, 2023
Toward an algebraic theory of systems
C Matt, U Maurer, C Portmann, R Renner, B Tackmann
Theoretical Computer Science 747, 1-25, 2018
Asymptotically optimal message dissemination with applications to blockchains
CD Liu-Zhang, C Matt, SE Thomsen
Cryptology ePrint Archive, 2022
Policy-compliant signatures
C Badertscher, C Matt, H Waldner
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
Weight-based Nakamoto-style blockchains
SH Kamp, B Magri, C Matt, JB Nielsen, SE Thomsen, D Tschudi
International Conference on Cryptology and Information Security in Latin …, 2021
A constructive treatment of enhanced encryption schemes
C Matt
ETH Zurich, 2017
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–19