Dominique Schröder
Dominique Schröder
Full Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-Nürnberg
Verified email at - Homepage
Cited by
Cited by
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
International Workshop on Public Key Cryptography, 317-336, 2009
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
International Conference on Applied Cryptography and Network Security, 87-104, 2010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
International Workshop on Public Key Cryptography, 444-461, 2010
Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
T Ruffing, A Kate, D Schröder
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Privacy and access control for outsourced personal records
M Maffei, G Malavolta, M Reinert, D Schröder
2015 IEEE Symposium on Security and Privacy, 341-358, 2015
On the impossibility of three-move blind signature schemes
M Fischlin, D Schröder
Annual International Conference on the Theory and Applications of …, 2010
Security of blind signatures revisited
D Schröder, D Unruh
International Workshop on Public Key Cryptography, 662-679, 2012
Round optimal blind signatures
S Garg, V Rao, A Sahai, D Schröder, D Unruh
Annual Cryptology Conference, 630-648, 2011
Verifiable data streaming
D Schröder, H Schröder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
Journal of Cryptology 32 (2), 566-599, 2019
Delegatable functional signatures
S Meiser, D Schröder
IET Information Security 12 (3), 194-206, 2018
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016, 301-330, 2016
Security of verifiably encrypted signatures and a construction without random oracles
M Rückert, D Schröder
International Conference on Pairing-Based Cryptography, 17-34, 2009
Aggregate and verifiably encrypted signatures from multilinear maps without random oracles
M Rückert, D Schröder
International Conference on Information Security and Assurance, 750-759, 2009
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
International Conference on Security and Cryptography for Networks, 309-328, 2010
Efficient sanitizable signatures without random oracles
RWF Lai, T Zhang, SSM Chow, D Schröder
European Symposium on Research in Computer Security, 363-380, 2016
Security of blind signatures under aborts
M Fischlin, D Schröder
International Workshop on Public Key Cryptography, 297-316, 2009
Phoenix: Rebirth of a Cryptographic {Password-Hardening} Service
RWF Lai, C Egger, D Schröder, SSM Chow
26th USENIX Security Symposium (USENIX Security 17), 899-916, 2017
Omniring: Scaling private payments without trusted setup
RWF Lai, V Ronge, T Ruffing, D Schröder, SAK Thyagarajan, J Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Public-key encryption with non-interactive opening: New constructions and stronger definitions
D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, ...
International Conference on Cryptology in Africa, 333-350, 2010
The system can't perform the operation now. Try again later.
Articles 1–20