[go: up one dir, main page]

Follow
Eike Kiltz
Eike Kiltz
Professor of Computer Science, Ruhr-Universität Bochum
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
2018 IEEE European symposium on security and privacy (EuroS&P), 353-367, 2018
16352018
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual international cryptology conference, 205-222, 2005
12702005
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Journal of cryptology 25 (4), 601-639, 2012
12312012
Crystals-dilithium: A lattice-based digital signature scheme
L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, P Schwabe, G Seiler, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 238-268, 2018
10192018
A modular analysis of the Fujisaki-Okamoto transformation
D Hofheinz, K Hövelmanns, E Kiltz
Theory of Cryptography Conference, 341-371, 2017
7652017
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft
Theory of Cryptography Conference, 285-304, 2006
6382006
CRYSTALS-Kyber algorithm specifications and supporting documentation
R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
NIST PQC Round 2 (4), 1-43, 2019
5652019
An algebraic framework for Diffie–Hellman assumptions
A Escala, G Herold, E Kiltz, C Ràfols, J Villar
Journal of cryptology 30 (1), 242-288, 2017
5042017
The algebraic group model and its applications
G Fuchsbauer, E Kiltz, J Loss
Annual International Cryptology Conference, 33-62, 2018
4972018
The twin Diffie–Hellman problem and applications
D Cash, E Kiltz, V Shoup
Journal of Cryptology 22 (4), 470-504, 2009
4362009
Crystals-dilithium
V Lyubashevsky, L Ducas, E Kiltz, T Lepoint, P Schwabe, G Seiler, ...
Algorithm Specifications and Supporting Documentation 2, 2020
3842020
Secure hybrid encryption from weakened key encapsulation
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 553-571, 2007
3642007
Chosen-ciphertext security from tag-based encryption
E Kiltz
Theory of Cryptography Conference, 581-600, 2006
3272006
A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model
E Kiltz, V Lyubashevsky, C Schaffner
Annual international conference on the theory and applications of …, 2018
2792018
Crystals-kyber
P Schwabe, R Avanzi, J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, ...
Technical report, National Institute of Standards and Technology, 2020 …, 2020
2772020
CRYSTALS-Dilithium: Algorithm specifications and supporting documentation (version 3.1)
S Bai, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, P Schwabe, G Seiler, ...
NIST Post-Quantum Cryptography Standardization Round 3, 2021
2222021
On the security of two-round multi-signatures
M Drijvers, K Edalatnejad, B Ford, E Kiltz, J Loss, G Neven, I Stepanovs
2019 IEEE Symposium on Security and Privacy (SP), 1084-1101, 2019
1882019
Programmable hash functions and their applications
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 21-38, 2008
1852008
Leakage-resilient signatures
S Faust, E Kiltz, K Pietrzak, GN Rothblum
Theory of Cryptography Conference, 343-360, 2010
1832010
Non-interactive key exchange
ESV Freire, D Hofheinz, E Kiltz, KG Paterson
International Workshop on Public Key Cryptography, 254-271, 2013
1772013
The system can't perform the operation now. Try again later.
Articles 1–20