Christian Hanser
Title
Cited by
Cited by
Year
On cloud storage and the cloud of clouds approach
D Slamanig, C Hanser
2012 International Conference for Internet Technology and Secured …, 2012
572012
Revisiting cryptographic accumulators, additional properties and relations to other primitives
D Derler, C Hanser, D Slamanig
Cryptographers’ track at the rsa conference, 127-144, 2015
562015
Structure-preserving signatures on equivalence classes and their application to anonymous credentials
C Hanser, D Slamanig
International Conference on the Theory and Application of Cryptology and …, 2014
552014
Practical round-optimal blind signatures in the standard model
G Fuchsbauer, C Hanser, D Slamanig
Annual Cryptology Conference, 233-253, 2015
432015
Blank digital signatures
C Hanser, D Slamanig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
332013
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
G Fuchsbauer, C Hanser, D Slamanig
Cryptology ePrint Archive, Report 2014/944, 2014
26*2014
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves
C Hanser, D Slamanig
SECRYPT 2013, 10th International Conference on Security and Cryptography, 15-26, 2013
232013
Group signatures on mobile devices: Practical experiences
K Potzmader, J Winter, D Hein, C Hanser, P Teufl, L Chen
International Conference on Trust and Trustworthy Computing, 47-64, 2013
222013
EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes.
G Fuchsbauer, C Hanser, D Slamanig
IACR Cryptology ePrint Archive 2014, 944, 2014
192014
PRISMACLOUD D4. 4: overview of functional and malleable signature schemes
D Demirel, D Derler, C Hanser, H Pöhls, D Slamanig, G Traverso
., 2015
152015
Practical round-optimal blind signatures in the standard model from weaker assumptions
G Fuchsbauer, C Hanser, C Kamath, D Slamanig
International Conference on Security and Cryptography for Networks, 391-408, 2016
142016
Implementing RLWE-based Schemes Using an RSA Co-Processor
MR Albrecht, C Hanser, A Hoeller, T Pöppelmann, F Virdia, A Wallner
IACR Transactions on Cryptographic Hardware and Embedded Systems, 169-208, 2019
10*2019
Blank digital signatures: optimization and practical experiences
D Derler, C Hanser, D Slamanig
IFIP International Summer School on Privacy and Identity Management, 201-215, 2014
82014
Verifiably encrypted signatures: security revisited and a new construction
C Hanser, M Rabkin, D Schröder
European Symposium on Research in Computer Security, 146-164, 2015
72015
Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials.
D Derler, C Hanser, D Slamanig
DBSec 2014 2014, 49-65, 2014
62014
A new approach to efficient revocable attribute-based anonymous credentials
D Derler, C Hanser, D Slamanig
IMA International Conference on Cryptography and Coding, 57-74, 2015
52015
Towards authenticity and privacy preserving accountable workflows
D Derler, C Hanser, HC Pöhls, D Slamanig
IFIP International Summer School on Privacy and Identity Management, 170-186, 2015
42015
Speeding up the fixed-base comb method for faster scalar multiplication on Koblitz curves
C Hanser, C Wagner
International Conference on Availability, Reliability, and Security, 168-179, 2013
42013
New trends in elliptic curve cryptography
C Hanser
na, 2010
42010
Warrant-hiding delegation-by-certificate proxy signature schemes
C Hanser, D Slamanig
International Conference on Cryptology in India, 60-77, 2013
32013
The system can't perform the operation now. Try again later.
Articles 1–20