Markulf Kohlweiss
Markulf Kohlweiss
Verified email at ed.ac.uk
TitleCited byYear
Privacy-friendly aggregation for the smart-grid
K Kursawe, G Danezis, M Kohlweiss
International Symposium on Privacy Enhancing Technologies Symposium, 175-191, 2011
3182011
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009, 108-125, 2009
2582009
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2322006
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography, 356-374, 2008
2142008
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International Workshop on Public Key Cryptography, 481-500, 2009
2042009
A messy state of the union: Taming the composite state machines of TLS
B Beurdouche, K Bhargavan, A Delignat-Lavaud, C Fournet, M Kohlweiss, ...
Security and Privacy (SP), 2015 IEEE Symposium on, 535-552, 2015
1872015
Implementing TLS with verified cryptographic security
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub
Security and Privacy (SP), 2013 IEEE Symposium on, 445-459, 2013
1412013
Scramble! your social network data
F Beato, M Kohlweiss, K Wouters
International Symposium on Privacy Enhancing Technologies Symposium, 211-225, 2011
1132011
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
J Camenisch, M Kohlweiss, A Rial, C Sheedy
International Workshop on Public Key Cryptography, 196-214, 2009
1122009
Dependent types and multi-monadic effects in F
N Swamy, C Hriţcu, C Keller, A Rastogi, A Delignat-Lavaud, S Forest, ...
ACM SIGPLAN Notices 51 (1), 256-270, 2016
1032016
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy (SP), 253-270, 2015
972015
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
International Conference on the Theory and Application of Cryptology and …, 2012
792012
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
CA Ardagna, J Camenisch, M Kohlweiss, R Leenes, G Neven, B Priem, ...
Journal of Computer Security 18 (1), 123-160, 2010
752010
Pinocchio coin: building zerocoin from a succinct pairing-based proof system
G Danezis, C Fournet, M Kohlweiss, B Parno
Proceedings of the First ACM workshop on Language support for privacy …, 2013
742013
Differentially private billing with rebates
G Danezis, M Kohlweiss, A Rial
International Workshop on Information Hiding, 148-162, 2011
712011
Modular code-based cryptographic verification
C Fournet, M Kohlweiss, PY Strub
Proceedings of the 18th ACM conference on Computer and communications …, 2011
672011
Proving the TLS handshake secure (as it is)
K Bhargavan, C Fournet, M Kohlweiss, A Pironti, PY Strub, ...
International Cryptology Conference, 235-255, 2014
662014
Compact e-cash and simulatable VRFs revisited
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
International Conference on Pairing-Based Cryptography, 114-131, 2009
612009
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2012
602012
Tagged one-time signatures: Tight security and optimal tag size
M Abe, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Public-Key Cryptography–PKC 2013, 312-331, 2013
592013
The system can't perform the operation now. Try again later.
Articles 1–20