Dennis Hofheinz
Dennis Hofheinz
Department of Computer Science, ETH Zürich
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Annual International Conference on the Theory and Applications of …, 2010
7772010
Secure hybrid encryption from weakened key encapsulation
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 553-571, 2007
3092007
A modular analysis of the Fujisaki-Okamoto transformation
D Hofheinz, K Hövelmanns, E Kiltz
Theory of Cryptography Conference, 341-371, 2017
2292017
Possibility and impossibility results for encryption and commitment secure under selective opening
M Bellare, D Hofheinz, S Yilek
Annual International Conference on the Theory and Applications of …, 2009
2092009
Tightly secure signatures and public-key encryption
D Hofheinz, T Jager
Designs, Codes and Cryptography 80 (1), 29-61, 2016
1412016
Programmable hash functions and their applications
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 21-38, 2008
1412008
Practical chosen ciphertext secure encryption from factoring
D Hofheinz, E Kiltz
Annual International Conference on the Theory and Applications of …, 2009
1352009
Bounded key-dependent message security
B Barak, I Haitner, D Hofheinz, Y Ishai
Annual International Conference on the Theory and Applications of …, 2010
1302010
Obfuscation for cryptographic purposes
D Hofheinz, J Malone-Lee, M Stam
Journal of Cryptology 23 (1), 121-168, 2010
1192010
A practical attack on some braid group based cryptographic primitives
D Hofheinz, R Steinwandt
International Workshop on Public Key Cryptography, 187-198, 2003
1082003
Programmable hash functions in the multilinear setting
ESV Freire, D Hofheinz, KG Paterson, C Striecks
Annual Cryptology Conference, 513-530, 2013
952013
The group of signed quadratic residues and applications
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 637-653, 2009
952009
Bounded CCA2-secure encryption
R Cramer, G Hanaoka, D Hofheinz, H Imai, E Kiltz, R Pass, A Shelat, ...
International Conference on the Theory and Application of Cryptology and …, 2007
892007
Multicomponent reactions provide key molecules for secret communication
AC Boukis, K Reiter, M Frölich, D Hofheinz, MAR Meier
Nature communications 9 (1), 1-10, 2018
792018
Tightly CCA-secure encryption without pairings
R Gay, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2016
762016
Non-interactive key exchange
ESV Freire, D Hofheinz, E Kiltz, KG Paterson
International Workshop on Public Key Cryptography, 254-271, 2013
762013
Encryption schemes secure against chosen-ciphertext selective opening attacks
S Fehr, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2010
752010
GNUC: A new universal composability framework
D Hofheinz, V Shoup
Journal of Cryptology 28 (3), 423-508, 2015
742015
Universally composable commitments using random oracles
D Hofheinz, J Müller-Quade
Theory of Cryptography Conference, 58-76, 2004
742004
CoSP: A general framework for computational soundness proofs
M Backes, D Hofheinz, D Unruh
Proceedings of the 16th ACM conference on Computer and communications …, 2009
722009
The system can't perform the operation now. Try again later.
Articles 1–20