[go: up one dir, main page]

Follow
Serge Fehr
Title
Cited by
Cited by
Year
On quantum Rényi entropies: A new generalization and some properties
M Müller-Lennert, F Dupuis, O Szehr, S Fehr, M Tomamichel
Journal of Mathematical Physics 54 (12), 2013
9072013
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of …, 2008
3732008
Cryptography in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
SIAM Journal on Computing 37 (6), 1865-1890, 2008
3282008
On notions of security for deterministic encryption, and efficient constructions without random oracles
A Boldyreva, S Fehr, A O’Neill
Annual International Cryptology Conference, 335-359, 2008
2782008
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
2582014
Security of the Fiat-Shamir transformation in the quantum random-oracle model
J Don, S Fehr, C Majenz, C Schaffner
Annual International Cryptology Conference, 356-383, 2019
2322019
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
M Tomamichel, S Fehr, J Kaniewski, S Wehner
New Journal of Physics 15 (10), 103002, 2013
228*2013
On the conditional Rényi entropy
S Fehr, S Berens
IEEE Transactions on Information Theory 60 (11), 6801-6810, 2014
1942014
Near-linear unconditionally-secure multiparty computation with a dishonest minority
E Ben-Sasson, S Fehr, R Ostrovsky
Annual Cryptology Conference, 663-680, 2012
1622012
A tight high-order entropic quantum uncertainty relation with applications
IB Damgård, S Fehr, R Renner, L Salvail, C Schaffner
Annual International Cryptology Conference, 360-378, 2007
1462007
Perfect NIZK with adaptive soundness
M Abe, S Fehr
Theory of Cryptography Conference, 118-136, 2007
1372007
Efficient multi-party computation over rings
R Cramer, S Fehr, Y Ishai, E Kushilevitz
International Conference on the Theory and Applications of Cryptographic …, 2003
1362003
Fiat-shamir transformation of multi-round interactive proofs
T Attema, S Fehr, M Klooß
Theory of Cryptography Conference, 113-142, 2022
1262022
Security and composability of randomness expansion from Bell inequalities
S Fehr, R Gelles, C Schaffner
Physical Review A—Atomic, Molecular, and Optical Physics 87 (1), 012335, 2013
1222013
Online-extractability in the quantum random-oracle model
J Don, S Fehr, C Majenz, C Schaffner
Annual International Conference on the Theory and Applications of …, 2022
1182022
Optimal black-box secret sharing over arbitrary abelian groups
R Cramer, S Fehr
Annual International Cryptology Conference, 272-287, 2002
1172002
Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography
M Abe, S Fehr
Annual International Cryptology Conference, 317-334, 2004
1082004
Secure identification and QKD in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
Annual International Cryptology Conference, 342-359, 2007
101*2007
Encryption schemes secure against chosen-ciphertext selective opening attacks
S Fehr, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2010
1002010
The measure-and-reprogram technique 2.0: Multi-round fiat-shamir and more
J Don, S Fehr, C Majenz
Annual International Cryptology Conference, 602-631, 2020
972020
The system can't perform the operation now. Try again later.
Articles 1–20