Follow
Nils Fleischhacker
Nils Fleischhacker
Assistant Professor, Ruhr University Bochum
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
832016
Limitations of the meta-reduction technique: The case of Schnorr signatures
M Fischlin, N Fleischhacker
Annual International Conference on the Theory and Applications of …, 2013
682013
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
552014
A modular framework for multi-factor authentication and key exchange
N Fleischhacker, M Manulis, A Azodi
Security Standardisation Research: First International Conference, SSR 2014 …, 2014
48*2014
Group signatures: Authentication with privacy
M Manulis, N Fleischhacker, F Günther, F Kiefer, B Poettrering
Bundesamt fur Sicherheit in der Informationstechnik, Bonn, Germany, Tech. Rep, 2012
42*2012
Efficient cryptographic password hardening services from partially oblivious commitments
J Schneider, N Fleischhacker, D Schröder, M Backes
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
322016
Feasibility and infeasibility of secure computation with malicious PUFs
D Dachman-Soled, N Fleischhacker, J Katz, A Lysyanskaya, D Schröder
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
282014
Squirrel: efficient synchronized multi-signatures from lattices
N Fleischhacker, M Simkin, Z Zhang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
252022
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
Journal of Cryptology 32 (2), 566-599, 2019
232019
On the existence of three round zero-knowledge proofs
N Fleischhacker, V Goyal, A Jain
Annual International Conference on the Theory and Applications of …, 2018
232018
On statistically secure obfuscation with approximate correctness
Z Brakerski, C Brzuska, N Fleischhacker
Annual International Cryptology Conference, 551-578, 2016
162016
Two-message, oblivious evaluation of cryptographic functionalities
N Döttling, N Fleischhacker, J Krupp, D Schröder
Annual International Cryptology Conference, 619-648, 2016
132016
Property-preserving hash functions for hamming distance from standard assumptions
N Fleischhacker, KG Larsen, M Simkin
Annual International Conference on the Theory and Applications of …, 2022
122022
How to compress encrypted data
N Fleischhacker, KG Larsen, M Simkin
Annual International Conference on the Theory and Applications of …, 2023
112023
Chipmunk: Better synchronized multi-signatures from lattices
N Fleischhacker, G Herold, M Simkin, Z Zhang
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
82023
Robust property-preserving hash functions for hamming distance and more
N Fleischhacker, M Simkin
Annual International Conference on the Theory and Applications of …, 2021
82021
SDF—Solar-aware distributed flow in wireless sensor networks
I Schweizer, N Fleischhacker, M Mühlhäuser, T Strufe
2011 IEEE 36th Conference on Local Computer Networks, 382-390, 2011
62011
Pseudorandom signatures
N Fleischhacker, F Günther, F Kiefer, M Manulis, B Poettering
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
52013
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT
N Fleischhacker, M Hall-Andersen, M Simkin
Cryptology ePrint Archive, 2024
42024
Feasibility and infeasibility of secure computation with malicious PUFs
D Dachman-Soled, N Fleischhacker, J Katz, A Lysyanskaya, D Schröder
Journal of Cryptology 33, 595-617, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20