Follow
Markulf Kohlweiss
Markulf Kohlweiss
Verified email at ed.ac.uk
Title
Cited by
Cited by
Year
Privacy-friendly aggregation for the smart-grid
K Kursawe, G Danezis, M Kohlweiss
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
4732011
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
Proceedings of the 43rd annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2016
3702016
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
Communications of the ACM 60 (2), 99-107, 2017
3612017
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
3352009
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
3182009
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
3092006
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography, 356-374, 2008
2712008
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
2562015
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2522019
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
2013 IEEE Symposium on Security and Privacy, 445-459, 2013
2312013
One-out-of-many proofs: Or how to leak a secret and spend a coin
J Groth, M Kohlweiss
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
1862015
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
J Camenisch, M Kohlweiss, A Rial, C Sheedy
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1712009
Updatable and universal common reference strings with applications to zk-SNARKs
J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1472018
Scramble! your social network data
F Beato, M Kohlweiss, K Wouters
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
1372011
Square span programs with applications to succinct NIZK arguments
G Danezis, C Fournet, J Groth, M Kohlweiss
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
1292014
Pinocchio Coin: building Zerocoin from a succinct pairing-based proof system
G Danezis, C Fournet, M Kohlweiss, B Parno
Proceedings of the First ACM workshop on Language support for privacy …, 2013
1292013
On the Non-malleability of the Fiat-Shamir Transform.
S Faust, M Kohlweiss, GA Marson, D Venturi
INDOCRYPT 7668, 60-79, 2012
1262012
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Journal of Cryptology 29, 833-878, 2016
1222016
Implementing and proving the TLS 1.3 record layer
A Delignat-Lavaud, C Fournet, M Kohlweiss, J Protzenko, A Rastogi, ...
2017 IEEE Symposium on Security and Privacy (SP), 463-482, 2017
114*2017
Proving the TLS handshake secure (as it is)
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ...
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1062014
The system can't perform the operation now. Try again later.
Articles 1–20