12 Publications

Mark all

[12]
2016 | Journal Article | IST-REx-ID: 1479 | OA
A counterexample to the chain rule for conditional HILL entropy
S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.
[Submitted Version] View | Files available | DOI
 
[11]
2013 | Conference Paper | IST-REx-ID: 2259 | OA
Learning with rounding, revisited: New reduction properties and applications
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
[Published Version] View | Files available | DOI
 
[10]
2013 | Conference Paper | IST-REx-ID: 2940 | OA
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
[Submitted Version] View | Files available | DOI
 
[9]
2013 | Conference Paper | IST-REx-ID: 2973 | OA
Bringing Zero-Knowledge Proofs of Knowledge to Practice
E. Bangerter, S. Barzan, S. Krenn, A. Sadeghi, T. Schneider, J. Tsay, in:, B. Christianson, J. Malcolm, V. Matyas, M. Roe (Eds.), Springer, 2013, pp. 51–62.
View | DOI | Download (ext.)
 
[8]
2012 | Conference Paper | IST-REx-ID: 2937 | OA
Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols
J. Almeida, M. Barbosa, E. Bangerter, G. Barthe, S. Krenn, S. Béguelin, in:, Proceedings of the 2012 ACM Conference on Computer and Communications Security, ACM, 2012, pp. 488–500.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[7]
2012 | Conference Paper | IST-REx-ID: 2974 | OA
Commitments and efficient zero knowledge proofs from learning parity with noise
A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.
[Submitted Version] View | Files available | DOI
 
[6]
2011 | Conference Paper | IST-REx-ID: 2975
A Framework for Practical Universally Composable Zero-Knowledge Protocols
J. Camenisch, S. Krenn, V. Shoup, in:, D. Lee, X. Wang (Eds.), Springer, 2011, pp. 449–467.
View | DOI | Download (ext.)
 
[5]
2011 | Conference Paper | IST-REx-ID: 2977
cPLC - A Cryptographic Programming Language and Compiler
E. Bangerter, S. Krenn, M. Seifriz, U. Ultes Nitsche, in:, H. Venter, M. Coetzee, M. Loock (Eds.), IEEE, 2011.
View | DOI
 
[4]
2011 | Conference Paper | IST-REx-ID: 2976
Cache Games - Bringing Access-Based Cache Attacks on AES to Practice
D. Gullasch, E. Bangerter, S. Krenn, in:, IEEE, 2011, pp. 490–505.
View | DOI | Download (ext.)
 
[3]
2010 | Conference Paper | IST-REx-ID: 2979 | OA
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols
J. Almeida, E. Bangerter, M. Barbosa, S. Krenn, A. Sadeghi, T. Schneider, in:, D. Gritzalis, B. Preneel, M. Theoharidou (Eds.), Springer, 2010, pp. 151–167.
View | DOI | Download (ext.)
 
[2]
2010 | Conference Paper | IST-REx-ID: 2980 | OA
Automatic Generation of Sigma-Protocols
E. Bangerter, T. Briner, W. Henecka, S. Krenn, A. Sadeghi, T. Schneider, in:, F. Martinelli, B. Preneel (Eds.), Springer, 2010, pp. 67–82.
View | DOI | Download (ext.)
 
[1]
2010 | Conference Paper | IST-REx-ID: 2978 | OA
Efficiency Limitations for Σ-Protocols for Group Homomorphisms
E. Bangerter, J. Camenisch, S. Krenn, in:, D. Micciancio (Ed.), Springer, 2010, pp. 553–571.
View | DOI | Download (ext.)
 

Search

Filter Publications

12 Publications

Mark all

[12]
2016 | Journal Article | IST-REx-ID: 1479 | OA
A counterexample to the chain rule for conditional HILL entropy
S. Krenn, K.Z. Pietrzak, A. Wadia, D. Wichs, Computational Complexity 25 (2016) 567–605.
[Submitted Version] View | Files available | DOI
 
[11]
2013 | Conference Paper | IST-REx-ID: 2259 | OA
Learning with rounding, revisited: New reduction properties and applications
J.F. Alwen, S. Krenn, K.Z. Pietrzak, D. Wichs, 8042 (2013) 57–74.
[Published Version] View | Files available | DOI
 
[10]
2013 | Conference Paper | IST-REx-ID: 2940 | OA
A counterexample to the chain rule for conditional HILL entropy, and what deniable encryption has to do with it
S. Krenn, K.Z. Pietrzak, A. Wadia, in:, A. Sahai (Ed.), Springer, 2013, pp. 23–39.
[Submitted Version] View | Files available | DOI
 
[9]
2013 | Conference Paper | IST-REx-ID: 2973 | OA
Bringing Zero-Knowledge Proofs of Knowledge to Practice
E. Bangerter, S. Barzan, S. Krenn, A. Sadeghi, T. Schneider, J. Tsay, in:, B. Christianson, J. Malcolm, V. Matyas, M. Roe (Eds.), Springer, 2013, pp. 51–62.
View | DOI | Download (ext.)
 
[8]
2012 | Conference Paper | IST-REx-ID: 2937 | OA
Full proof cryptography: Verifiable compilation of efficient zero-knowledge protocols
J. Almeida, M. Barbosa, E. Bangerter, G. Barthe, S. Krenn, S. Béguelin, in:, Proceedings of the 2012 ACM Conference on Computer and Communications Security, ACM, 2012, pp. 488–500.
[Submitted Version] View | DOI | Download Submitted Version (ext.)
 
[7]
2012 | Conference Paper | IST-REx-ID: 2974 | OA
Commitments and efficient zero knowledge proofs from learning parity with noise
A. Jain, S. Krenn, K.Z. Pietrzak, A. Tentes, in:, X. Wang, K. Sako (Eds.), Springer, 2012, pp. 663–680.
[Submitted Version] View | Files available | DOI
 
[6]
2011 | Conference Paper | IST-REx-ID: 2975
A Framework for Practical Universally Composable Zero-Knowledge Protocols
J. Camenisch, S. Krenn, V. Shoup, in:, D. Lee, X. Wang (Eds.), Springer, 2011, pp. 449–467.
View | DOI | Download (ext.)
 
[5]
2011 | Conference Paper | IST-REx-ID: 2977
cPLC - A Cryptographic Programming Language and Compiler
E. Bangerter, S. Krenn, M. Seifriz, U. Ultes Nitsche, in:, H. Venter, M. Coetzee, M. Loock (Eds.), IEEE, 2011.
View | DOI
 
[4]
2011 | Conference Paper | IST-REx-ID: 2976
Cache Games - Bringing Access-Based Cache Attacks on AES to Practice
D. Gullasch, E. Bangerter, S. Krenn, in:, IEEE, 2011, pp. 490–505.
View | DOI | Download (ext.)
 
[3]
2010 | Conference Paper | IST-REx-ID: 2979 | OA
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols
J. Almeida, E. Bangerter, M. Barbosa, S. Krenn, A. Sadeghi, T. Schneider, in:, D. Gritzalis, B. Preneel, M. Theoharidou (Eds.), Springer, 2010, pp. 151–167.
View | DOI | Download (ext.)
 
[2]
2010 | Conference Paper | IST-REx-ID: 2980 | OA
Automatic Generation of Sigma-Protocols
E. Bangerter, T. Briner, W. Henecka, S. Krenn, A. Sadeghi, T. Schneider, in:, F. Martinelli, B. Preneel (Eds.), Springer, 2010, pp. 67–82.
View | DOI | Download (ext.)
 
[1]
2010 | Conference Paper | IST-REx-ID: 2978 | OA
Efficiency Limitations for Σ-Protocols for Group Homomorphisms
E. Bangerter, J. Camenisch, S. Krenn, in:, D. Micciancio (Ed.), Springer, 2010, pp. 553–571.
View | DOI | Download (ext.)
 

Search

Filter Publications