Follow
Dominique Schröder
Dominique Schröder
Full Professor, Computer Science, TU Wien
No verified email - Homepage
Title
Cited by
Cited by
Year
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1822009
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
1462010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1212010
Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
T Ruffing, A Kate, D Schröder
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1012015
Privacy and access control for outsourced personal records
M Maffei, G Malavolta, M Reinert, D Schröder
2015 IEEE Symposium on Security and Privacy, 341-358, 2015
972015
On the impossibility of three-move blind signature schemes
M Fischlin, D Schröder
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
892010
Omniring: Scaling private payments without trusted setup
RWF Lai, V Ronge, T Ruffing, D Schröder, SAK Thyagarajan, J Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
78*2019
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016, 301-330, 2016
762016
Security of blind signatures revisited
D Schröder, D Unruh
International Workshop on Public Key Cryptography, 662-679, 2012
75*2012
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
Journal of Cryptology 32 (2), 566-599, 2019
74*2019
Round optimal blind signatures
S Garg, V Rao, A Sahai, D Schröder, D Unruh
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
722011
Verifiable data streaming
D Schröder, H Schröder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
702012
Verifiable timed signatures made practical
SAK Thyagarajan, A Bhat, G Malavolta, N Döttling, A Kate, D Schröder
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
642020
Aggregate and verifiably encrypted signatures from multilinear maps without random oracles
M Rückert, D Schröder
International Conference on Information Security and Assurance, 750-759, 2009
592009
Delegatable functional signatures
S Meiser, D Schröder
IET Information Security 12 (3), 194-206, 2018
58*2018
Phoenix: Rebirth of a Cryptographic {Password-Hardening} Service
RWF Lai, C Egger, D Schröder, SSM Chow
26th USENIX Security Symposium (USENIX Security 17), 899-916, 2017
582017
Security of verifiably encrypted signatures and a construction without random oracles
M Rückert, D Schröder
International Conference on Pairing-Based Cryptography, 17-34, 2009
542009
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
532010
Simple {Password-Hardened} Encryption Services
RWF Lai, C Egger, M Reinert, SSM Chow, M Maffei, D Schröder
27th USENIX Security Symposium (USENIX Security 18), 1405-1421, 2018
442018
Efficient sanitizable signatures without random oracles
RWF Lai, T Zhang, SSM Chow, D Schröder
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
442016
The system can't perform the operation now. Try again later.
Articles 1–20