What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jan Camenisch
Google Scholar
90
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/eurosp
Zone Encryption with Anonymous Authentication for V2V Communication.
Jan Camenisch
Manu Drijvers
Anja Lehmann
Gregory Neven
Patrick Towa
2019
journals/joc
On the Impossibility of Structure-Preserving Deterministic Primitives.
Masayuki Abe
Jan Camenisch
Rafael Dowsley
Maria Dubovitskaya
2019
conf/sec
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards.
Jan Camenisch
Manu Drijvers
Petr Dzurenda
Jan Hajny
2019
conf/fc
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
Jan Camenisch
Angelo De Caro
Esha Ghosh
Alessandro Sorniotti
2019
conf/acns
Password-Authenticated Public-Key Encryption.
Tatiana Bradley
Jan Camenisch
Stanislaw Jarecki
Anja Lehmann
Gregory Neven
Jiayu Xu
2019
conf/asiacrypt
iUC: Flexible Universal Composability Made Simple.
Jan Camenisch
Stephan Krenn
Ralf Küsters
Daniel Rausch
2018
conf/acns
Floppy-Sized Group Signatures from Lattices.
Cecilia Boschini
Jan Camenisch
Gregory Neven
2018
conf/eurocrypt
The Wonderful World of Global Random Oracles.
Jan Camenisch
Manu Drijvers
Tommaso Gagliardoni
Anja Lehmann
Gregory Neven
2017
conf/ccs
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain.
Jan Camenisch
Manu Drijvers
Maria Dubovitskaya
2017
conf/acisp
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
Michael Till Beck
Jan Camenisch
David Derler
Stephan Krenn
Henrich C. Pöhls
Kai Samelin
Daniel Slamanig
2017
conf/crypto
Anonymous Attestation with Subverted TPMs.
Jan Camenisch
Manu Drijvers
Anja Lehmann
2017
conf/fc
Updatable Tokenization: Formal Definitions and Provably Secure Constructions.
Christian Cachin
Jan Camenisch
Eduarda Freire-Stögbuchner
Anja Lehmann
2017
conf/sp
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation.
Jan Camenisch
Liqun Chen
Manu Drijvers
Anja Lehmann
David Novick
Rainer Urian
2017
conf/eurosp
Accumulators with Applications to Anonymity-Preserving Revocation.
Foteini Baldimtsi
Jan Camenisch
Maria Dubovitskaya
Anna Lysyanskaya
Leonid Reyzin
Kai Samelin
Sophia Yakoubov
2017
conf/eurosp
Privacy-Preserving User-Auditable Pseudonym Systems.
Jan Camenisch
Anja Lehmann
2017
conf/pkc
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.
Jan Camenisch
David Derler
Stephan Krenn
Henrich C. Pöhls
Kai Samelin
Daniel Slamanig
2016
conf/crypto
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.
Jan Camenisch
Maria Dubovitskaya
Alfredo Rial
2016
conf/pkc
Universally Composable Direct Anonymous Attestation.
Jan Camenisch
Manu Drijvers
Anja Lehmann
2016
conf/asiacrypt
Universal Composition with Responsive Environments.
Jan Camenisch
Robert R. Enderlein
Stephan Krenn
Ralf Küsters
Daniel Rausch
2015
journals/joc
Computing on Authenticated Data.
Jae Hyun Ahn
Dan Boneh
Jan Camenisch
Susan Hohenberger
Abhi Shelat
Brent Waters
2015
conf/ccs
Optimal Distributed Password Verification.
Jan Camenisch
Anja Lehmann
Gregory Neven
2015
conf/ccs
(Un)linkable Pseudonyms for Governmental Databases.
Jan Camenisch
Anja Lehmann
2015
conf/acns
Recovering Lost Device-Bound Credentials.
Foteini Baldimtsi
Jan Camenisch
Lucjan Hanzlik
Stephan Krenn
Anja Lehmann
Gregory Neven
2015
conf/pkc
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
Jan Camenisch
Robert R. Enderlein
Gregory Neven
2015
conf/asiacrypt
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions.
Jan Camenisch
Maria Dubovitskaya
Kristiyan Haralambiev
Markulf Kohlweiss
2015
conf/sacrypt
Formal Treatment of Privacy-Enhancing Credential Systems.
Jan Camenisch
Stephan Krenn
Anja Lehmann
Gert Læssøe Mikkelsen
Gregory Neven
Michael Østergaard Pedersen
2014
journals/istr
Concepts and languages for privacy-preserving attribute-based authentication.
Jan Camenisch
Maria Dubovitskaya
Robert R. Enderlein
Anja Lehmann
Gregory Neven
Christian Paquin
Franz-Stefan Preiss
2014
conf/crypto
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.
Jan Camenisch
Anja Lehmann
Anna Lysyanskaya
Gregory Neven
2014
conf/esorics
Privacy-Preserving Auditing for Attribute-Based Credentials.
Jan Camenisch
Anja Lehmann
Gregory Neven
Alfredo Rial
2014
conf/asiacrypt
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Fabrice Benhamouda
Jan Camenisch
Stephan Krenn
Vadim Lyubashevsky
Gregory Neven
2014
conf/tcc
On the Impossibility of Structure-Preserving Deterministic Primitives.
Masayuki Abe
Jan Camenisch
Rafael Dowsley
Maria Dubovitskaya
2013
conf/esorics
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn.
Jan Camenisch
Robert R. Enderlein
Victor Shoup
2012
journals/joc
Batch Verification of Short Signatures.
Jan Camenisch
Susan Hohenberger
Michael Østergaard Pedersen
2012
conf/ccs
Practical yet universally composable two-server password-authenticated secret sharing.
Jan Camenisch
Anna Lysyanskaya
Gregory Neven
2012
conf/tcc
Computing on Authenticated Data.
Jae Hyun Ahn
Dan Boneh
Jan Camenisch
Susan Hohenberger
Abhi Shelat
Brent Waters
2011
conf/ccs
Cryptographic primitives for building secure and privacy respecting protocols.
Jan Camenisch
2011
conf/pkc
Oblivious Transfer with Hidden Access Control Policies.
Jan Camenisch
Maria Dubovitskaya
Gregory Neven
Gregory M. Zaverucha
2011
conf/asiacrypt
A Framework for Practical Universally Composable Zero-Knowledge Protocols.
Jan Camenisch
Stephan Krenn
Victor Shoup
2011
conf/asiacrypt
Structure Preserving CCA Secure Encryption and Applications.
Jan Camenisch
Kristiyan Haralambiev
Markulf Kohlweiss
Jorn Lapon
Vincent Naessens
2010
conf/crypto
Credential Authenticated Identification and Key Exchange.
Jan Camenisch
Nathalie Casati
Thomas Gross
Victor Shoup
2010
conf/fc
Unlinkable Priced Oblivious Transfer with Rechargeable Wallets.
Jan Camenisch
Maria Dubovitskaya
Gregory Neven
2010
conf/tcc
Privacy-Enhancing Cryptography: From Theory into Practice.
Jan Camenisch
2010
conf/tcc
Efficiency Limitations for Σ-Protocols for Group Homomorphisms.
Endre Bangerter
Jan Camenisch
Stephan Krenn
2009
conf/ccs
Oblivious transfer with access control.
Jan Camenisch
Maria Dubovitskaya
Gregory Neven
2009
conf/ccs
Anonymous credentials on a standard java card.
Patrik Bichsel
Jan Camenisch
Thomas Groß
Victor Shoup
2009
conf/crypto
Randomizable Proofs and Delegatable Anonymous Credentials.
Mira Belenkiy
Jan Camenisch
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Hovav Shacham
2009
conf/fc
Private Intersection of Certified Sets.
Jan Camenisch
Gregory M. Zaverucha
2009
conf/pkc
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
Jan Camenisch
Markulf Kohlweiss
Claudio Soriente
2009
conf/pkc
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data.
Jan Camenisch
Markulf Kohlweiss
Alfredo Rial
Caroline Sheedy
2009
conf/eurocrypt
On the Portability of Generalized Schnorr Proofs.
Jan Camenisch
Aggelos Kiayias
Moti Yung
2009
conf/eurocrypt
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks.
Jan Camenisch
Nishanth Chandran
Victor Shoup
2008
conf/ccs
Efficient attributes for anonymous credentials.
Jan Camenisch
Thomas Groß
2008
conf/asiacrypt
Efficient Protocols for Set Membership and Range Proofs.
Jan Camenisch
Rafik Chaabouni
Abhi Shelat
2007
conf/sp
Endorsed E-Cash.
Jan Camenisch
Anna Lysyanskaya
Mira Meyerovich
2007
conf/eurocrypt
Simulatable Adaptive Oblivious Transfer.
Jan Camenisch
Gregory Neven
Abhi Shelat
2007
conf/eurocrypt
Batch Verification of Short Signatures.
Jan Camenisch
Susan Hohenberger
Michael Østergaard Pedersen
2006
conf/ccs
How to win the clonewars: efficient periodic n-times anonymous authentication.
Jan Camenisch
Susan Hohenberger
Markulf Kohlweiss
Anna Lysyanskaya
Mira Meyerovich
2006
conf/sec
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures.
Jan Camenisch
Dieter Sommer
Roger Zimmermann
2006
conf/sec
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2.
Jan Camenisch
2006
conf/sec
Anonymous Credentials: Opportunities and Challenges.
Jan Camenisch
2005
conf/ccs
Untraceable RFID tags via insubvertible encryption.
Giuseppe Ateniese
Jan Camenisch
Breno de Medeiros
2005
conf/crypto
A Formal Treatment of Onion Routing.
Jan Camenisch
Anna Lysyanskaya
2005
conf/pkc
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order.
Endre Bangerter
Jan Camenisch
Ueli M. Maurer
2005
conf/eurocrypt
Compact E-Cash.
Jan Camenisch
Susan Hohenberger
Anna Lysyanskaya
2004
journals/istr
Privacy-enhancing identity management.
Marit Hansen
Peter Berlich
Jan Camenisch
Sebastian Clauß
Andreas Pfitzmann
Michael Waidner
2004
conf/ccs
Direct anonymous attestation.
Ernest F. Brickell
Jan Camenisch
Liqun Chen
2004
conf/crypto
Signature Schemes and Anonymous Credentials from Bilinear Maps.
Jan Camenisch
Anna Lysyanskaya
2004
conf/esorics
Better Privacy for Trusted Computing Platforms: (Extended Abstract).
Jan Camenisch
2003
conf/crypto
Practical Verifiable Encryption and Decryption of Discrete Logarithms.
Jan Camenisch
Victor Shoup
2002
conf/ccs
anonymous credential system.
Jan Camenisch
Els Van Herreweghen
2002
conf/crypto
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products.
Joy Algesheimer
Jan Camenisch
Victor Shoup
2002
conf/crypto
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.
Jan Camenisch
Anna Lysyanskaya
2001
conf/crypto
An Identity Escrow Scheme with Appointed Verifiers.
Jan Camenisch
Anna Lysyanskaya
2001
conf/sp
Cryptographic Security for Mobile Code.
Joy Algesheimer
Christian Cachin
Jan Camenisch
Günter Karjoth
2001
conf/eurocrypt
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.
Jan Camenisch
Anna Lysyanskaya
2000
conf/crypto
Optimistic Fair Secure Computation.
Christian Cachin
Jan Camenisch
2000
conf/crypto
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
Giuseppe Ateniese
Jan Camenisch
Marc Joye
Gene Tsudik
2000
conf/eurocrypt
Confirmer Signature Schemes Secure against Adaptive Adversaries.
Jan Camenisch
Markus Michels
2000
conf/asiacrypt
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes.
Jan Camenisch
Ivan Damgård
2000
conf/asiacrypt
Efficient Anonymous Fingerprinting with Group Signatures.
Jan Camenisch
1999
conf/crypto
Separability and Efficiency for Generic Group Signature Schemes.
Jan Camenisch
Markus Michels
1999
conf/eurocrypt
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes.
Jan Camenisch
Markus Michels
1998
conf/asiacrypt
A Group Signature Scheme with Improved Efficiency.
Jan Camenisch
Markus Michels
1997
conf/crypto
Efficient Group Signature Schemes for Large Groups (Extended Abstract).
Jan Camenisch
Markus Stadler
1997
conf/eurocrypt
Efficient and Generalized Group Signatures.
Jan Camenisch
1996
conf/ccs
An Efficient Fair Payment System.
Jan Camenisch
Jean-Marc Piveteau
Markus Stadler
1996
conf/esorics
Digital Payment Systems with Passive Anonymity-Revoking Trustees.
Jan Camenisch
Ueli M. Maurer
Markus Stadler
1995
conf/eurocrypt
Fair Blind Signatures.
Markus Stadler
Jean-Marc Piveteau
Jan Camenisch
1994
conf/esorics
An Efficient Electronic Payment System Protecting Privacy.
Jan Camenisch
Jean-Marc Piveteau
Markus Stadler
1994
conf/eurocrypt
Blind Signatures Based on the Discrete Logarithm Problem.
Jan Camenisch
Jean-Marc Piveteau
Markus Stadler
Coauthors
Abhi Shelat
(4)
Aggelos Kiayias
(1)
Alessandro Sorniotti
(1)
Alfredo Rial
(3)
Andreas Pfitzmann
(1)
Angelo De Caro
(1)
Anja Lehmann
(15)
Anna Lysyanskaya
(12)
Breno de Medeiros
(1)
Brent Waters
(2)
Caroline Sheedy
(1)
Cecilia Boschini
(1)
Christian Cachin
(3)
Christian Paquin
(1)
Claudio Soriente
(1)
Dan Boneh
(2)
Daniel Rausch
(2)
Daniel Slamanig
(2)
David Derler
(2)
David Novick
(1)
Dieter Sommer
(1)
Eduarda Freire-Stögbuchner
(1)
Els Van Herreweghen
(1)
Endre Bangerter
(2)
Ernest F. Brickell
(1)
Esha Ghosh
(1)
Fabrice Benhamouda
(1)
Foteini Baldimtsi
(2)
Franz-Stefan Preiss
(1)
Gene Tsudik
(1)
Gert Læssøe Mikkelsen
(1)
Giuseppe Ateniese
(2)
Gregory M. Zaverucha
(2)
Gregory Neven
(17)
Günter Karjoth
(1)
Henrich C. Pöhls
(2)
Hovav Shacham
(1)
Ivan Damgård
(1)
Jae Hyun Ahn
(2)
Jan Camenisch
(90)
Jan Hajny
(1)
Jean-Marc Piveteau
(4)
Jiayu Xu
(1)
Jorn Lapon
(1)
Joy Algesheimer
(2)
Kai Samelin
(3)
Kristiyan Haralambiev
(2)
Leonid Reyzin
(1)
Liqun Chen
(2)
Lucjan Hanzlik
(1)
Manu Drijvers
(7)
Marc Joye
(1)
Maria Dubovitskaya
(10)
Marit Hansen
(1)
Markulf Kohlweiss
(6)
Markus Michels
(4)
Markus Stadler
(6)
Masayuki Abe
(2)
Melissa Chase
(1)
Michael Till Beck
(1)
Michael Waidner
(1)
Michael Østergaard Pedersen
(3)
Mira Belenkiy
(1)
Mira Meyerovich
(2)
Moti Yung
(1)
Nathalie Casati
(1)
Nishanth Chandran
(1)
Patrick Towa
(1)
Patrik Bichsel
(1)
Peter Berlich
(1)
Petr Dzurenda
(1)
Rafael Dowsley
(2)
Rafik Chaabouni
(1)
Rainer Urian
(1)
Ralf Küsters
(2)
Robert R. Enderlein
(4)
Roger Zimmermann
(1)
Sebastian Clauß
(1)
Sophia Yakoubov
(1)
Stanislaw Jarecki
(1)
Stephan Krenn
(9)
Susan Hohenberger
(6)
Tatiana Bradley
(1)
Thomas Groß
(2)
Thomas Gross
(1)
Tommaso Gagliardoni
(1)
Ueli M. Maurer
(2)
Vadim Lyubashevsky
(1)
Victor Shoup
(7)
Vincent Naessens
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to