Markulf Kohlweiss
Markulf Kohlweiss
Geverifieerd e-mailadres voor ed.ac.uk
TitelGeciteerd doorJaar
Privacy-friendly aggregation for the smart-grid
K Kursawe, G Danezis, M Kohlweiss
International Symposium on Privacy Enhancing Technologies Symposium, 175-191, 2011
3262011
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Annual International Cryptology Conference, 108-125, 2009
2582009
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2372006
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography, 356-374, 2008
2182008
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International Workshop on Public Key Cryptography, 481-500, 2009
2072009
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
2015 IEEE Symposium on Security and Privacy, 535-552, 2015
1922015
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
2013 IEEE Symposium on Security and Privacy, 445-459, 2013
1452013
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
ACM SIGPLAN Notices 51 (1), 256-270, 2016
1322016
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
J Camenisch, M Kohlweiss, A Rial, C Sheedy
International Workshop on Public Key Cryptography, 196-214, 2009
1122009
Scramble! your social network data
F Beato, M Kohlweiss, K Wouters
International Symposium on Privacy Enhancing Technologies Symposium, 211-225, 2011
1102011
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
1082015
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Journal of Cryptology 29 (4), 833-878, 2016
932016
Pinocchio coin: building zerocoin from a succinct pairing-based proof system
G Danezis, C Fournet, M Kohlweiss, B Parno
Proceedings of the First ACM workshop on Language support for privacy …, 2013
782013
Differentially private billing with rebates
G Danezis, M Kohlweiss, A Rial
International Workshop on Information Hiding, 148-162, 2011
732011
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
CA Ardagna, J Camenisch, M Kohlweiss, R Leenes, G Neven, B Priem, ...
Journal of Computer Security 18 (1), 123-160, 2010
712010
Modular code-based cryptographic verification
C Fournet, M Kohlweiss, PY Strub
Proceedings of the 18th ACM conference on Computer and communications …, 2011
682011
Proving the TLS handshake secure (as it is)
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ...
Annual Cryptology Conference, 235-255, 2014
672014
Compact e-cash and simulatable VRFs revisited
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
International Conference on Pairing-Based Cryptography, 114-131, 2009
652009
Transcript collision attacks: Breaking authentication in TLS, IKE, and SSH
K Bhargavan, G Leurent
Network and Distributed System Security Symposium--NDSS 2016, 2016
632016
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2012
622012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20