What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Markulf Kohlweiss
Google Scholar
ORCID:
0000-0002-8660-9663
59
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/cic
The Uber-Knowledge Assumption: A Bridge to the AGM.
Balthazar Bauer
Pooya Farshim
Patrick Harasser
Markulf Kohlweiss
2024
conf/fc
Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.
Jan Bobolz
Jesus Diaz
Markulf Kohlweiss
2024
conf/asiacrypt
Updatable Privacy-Preserving Blueprints.
Bernardo David
Felix Engelmann
Tore Kasper Frederiksen
Markulf Kohlweiss
Elena Pagnin
Mikhail Volkhov
2024
conf/tcc
The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs.
Jan Bobolz
Pooya Farshim
Markulf Kohlweiss
Akira Takahashi
2024
conf/cans
PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin.
Amirreza Sarencheh
Aggelos Kiayias
Markulf Kohlweiss
2023
conf/eurocrypt
Privacy-Preserving Blueprints.
Markulf Kohlweiss
Anna Lysyanskaya
An Nguyen
2023
conf/asiacrypt
Threshold Structure-Preserving Signatures.
Elizabeth C. Crites
Markulf Kohlweiss
Bart Preneel
Mahdi Sedaghat
Daniel Slamanig
2023
conf/tcc
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach.
Markulf Kohlweiss
Mahak Pancholi
Akira Takahashi
2023
conf/tcc
From Polynomial IOP and Commitments to Non-malleable zkSNARKs.
Antonio Faonio
Dario Fiore
Markulf Kohlweiss
Luigi Russo
Michal Zajac
2022
journals/popets
Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps.
Felix Engelmann
Thomas Kerber
Markulf Kohlweiss
Mikhail Volkhov
2022
conf/ccs
PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies.
Aggelos Kiayias
Markulf Kohlweiss
Amirreza Sarencheh
2022
conf/asiacrypt
Key-Schedule Security for the TLS 1.3 Standard.
Chris Brzuska
Antoine Delignat-Lavaud
Christoph Egger
Cédric Fournet
Konrad Kohbrok
Markulf Kohlweiss
2021
conf/crypto
Composition with Knowledge Assumptions.
Thomas Kerber
Aggelos Kiayias
Markulf Kohlweiss
2021
conf/fc
Mining for Privacy: How to Bootstrap a Snarky Blockchain.
Thomas Kerber
Aggelos Kiayias
Markulf Kohlweiss
2021
conf/fc
Another Look at Extraction and Randomization of Groth's zk-SNARK.
Karim Baghery
Markulf Kohlweiss
Janno Siim
Mikhail Volkhov
2021
conf/sp
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.
Markulf Kohlweiss
Varun Madathil
Kartik Nayak
Alessandra Scafuro
2021
conf/pkc
Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption.
Pramod Bhatotia
Markulf Kohlweiss
Lorenzo Martinico
Yiannis Tselekounis
2021
conf/asiacrypt
Snarky Ceremonies.
Markulf Kohlweiss
Mary Maller
Janno Siim
Mikhail Volkhov
2019
journals/joc
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
Masayuki Abe
Jens Groth
Markulf Kohlweiss
Miyako Ohkubo
Mehdi Tibouchi
2019
conf/ccs
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Mary Maller
Sean Bowe
Markulf Kohlweiss
Sarah Meiklejohn
2019
conf/sp
Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
Thomas Kerber
Aggelos Kiayias
Markulf Kohlweiss
Vassilis Zikas
2019
conf/pkc
Decentralizing Inner-Product Functional Encryption.
Michel Abdalla
Fabrice Benhamouda
Markulf Kohlweiss
Hendrik Waldner
2018
conf/crypto
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
Jens Groth
Markulf Kohlweiss
Mary Maller
Sarah Meiklejohn
Ian Miers
2018
conf/asiacrypt
State Separation for Code-Based Game-Playing Proofs.
Chris Brzuska
Antoine Delignat-Lavaud
Cédric Fournet
Konrad Kohbrok
Markulf Kohlweiss
2017
conf/sp
Implementing and Proving the TLS 1.3 Record Layer.
Antoine Delignat-Lavaud
Cédric Fournet
Markulf Kohlweiss
Jonathan Protzenko
Aseem Rastogi
Nikhil Swamy
Santiago Zanella-Béguelin
Karthikeyan Bhargavan
Jianyang Pan
Jean Karim Zinzindohoue
2016
journals/joc
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Masayuki Abe
Melissa Chase
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2016
conf/ccs
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
Dario Fiore
Cédric Fournet
Esha Ghosh
Markulf Kohlweiss
Olga Ohrimenko
Bryan Parno
2016
conf/sp
Downgrade Resilience in Key-Exchange Protocols.
Karthikeyan Bhargavan
Christina Brzuska
Cédric Fournet
Matthew Green
Markulf Kohlweiss
Santiago Zanella-Béguelin
2016
conf/sp
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Antoine Delignat-Lavaud
Cédric Fournet
Markulf Kohlweiss
Bryan Parno
2015
journals/popets
Accountable Metadata-Hiding Escrow: A Group Signature Case Study.
Markulf Kohlweiss
Ian Miers
2015
conf/ccs
Observing and Preventing Leakage in MapReduce.
Olga Ohrimenko
Manuel Costa
Cédric Fournet
Christos Gkantsidis
Markulf Kohlweiss
Divya Sharma
2015
conf/sp
Geppetto: Versatile Verifiable Computation.
Craig Costello
Cédric Fournet
Jon Howell
Markulf Kohlweiss
Benjamin Kreuter
Michael Naehrig
Bryan Parno
Samee Zahur
2015
conf/sp
A Messy State of the Union: Taming the Composite State Machines of TLS.
Benjamin Beurdouche
Karthikeyan Bhargavan
Antoine Delignat-Lavaud
Cédric Fournet
Markulf Kohlweiss
Alfredo Pironti
Pierre-Yves Strub
Jean Karim Zinzindohoue
2015
conf/pkc
Anonymous Transferable E-Cash.
Foteini Baldimtsi
Melissa Chase
Georg Fuchsbauer
Markulf Kohlweiss
2015
conf/eurocrypt
One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.
Jens Groth
Markulf Kohlweiss
2015
conf/eurocrypt
Fully Structure-Preserving Signatures and Shrinking Commitments.
Masayuki Abe
Markulf Kohlweiss
Miyako Ohkubo
Mehdi Tibouchi
2015
conf/asiacrypt
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions.
Jan Camenisch
Maria Dubovitskaya
Kristiyan Haralambiev
Markulf Kohlweiss
2014
conf/crypto
Proving the TLS Handshake Secure (As It Is).
Karthikeyan Bhargavan
Cédric Fournet
Markulf Kohlweiss
Alfredo Pironti
Pierre-Yves Strub
Santiago Zanella-Béguelin
2014
conf/asiacrypt
Square Span Programs with Applications to Succinct NIZK Arguments.
George Danezis
Cédric Fournet
Jens Groth
Markulf Kohlweiss
2013
conf/ccs
Smart meter aggregation via secret-sharing.
George Danezis
Cédric Fournet
Markulf Kohlweiss
Santiago Zanella-Béguelin
2013
conf/ccs
Pinocchio coin: building zerocoin from a succinct pairing-based proof system.
George Danezis
Cédric Fournet
Markulf Kohlweiss
Bryan Parno
2013
conf/uss
ZQL: A Compiler for Privacy-Preserving Data Processing.
Cédric Fournet
Markulf Kohlweiss
George Danezis
Zhengqin Luo
2013
conf/sp
Implementing TLS with Verified Cryptographic Security.
Karthikeyan Bhargavan
Cédric Fournet
Markulf Kohlweiss
Alfredo Pironti
Pierre-Yves Strub
2013
conf/pkc
Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
Masayuki Abe
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2013
conf/pkc
Verifiable Elections That Scale for Free.
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2013
conf/tcc
Succinct Malleable NIZKs and an Application to Compact Shuffles.
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2012
conf/eurocrypt
Malleable Proof Systems and Applications.
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2012
conf/asiacrypt
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Masayuki Abe
Melissa Chase
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2011
conf/ccs
Modular code-based cryptographic verification.
Cédric Fournet
Markulf Kohlweiss
Pierre-Yves Strub
2011
conf/ih
Differentially Private Billing with Rebates.
George Danezis
Markulf Kohlweiss
Alfredo Rial
2011
conf/asiacrypt
Structure Preserving CCA Secure Encryption and Applications.
Jan Camenisch
Kristiyan Haralambiev
Markulf Kohlweiss
Jorn Lapon
Vincent Naessens
2010
conf/sec
Performance Analysis of Accumulator-Based Revocation Mechanisms.
Jorn Lapon
Markulf Kohlweiss
Bart De Decker
Vincent Naessens
2009
conf/crypto
Randomizable Proofs and Delegatable Anonymous Credentials.
Mira Belenkiy
Jan Camenisch
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Hovav Shacham
2009
conf/soups
Threshold things that think: usable authorization for resharing.
Roel Peeters
Markulf Kohlweiss
Bart Preneel
Nicky Sulmon
2009
conf/pkc
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
Jan Camenisch
Markulf Kohlweiss
Claudio Soriente
2009
conf/pkc
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data.
Jan Camenisch
Markulf Kohlweiss
Alfredo Rial
Caroline Sheedy
2008
conf/wisec
Self-certified Sybil-free pseudonyms.
Leonardo A. Martucci
Markulf Kohlweiss
Christer Andersson
Andriy Panchenko
2008
conf/tcc
P-signatures and Noninteractive Anonymous Credentials.
Mira Belenkiy
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
2006
conf/ccs
How to win the clonewars: efficient periodic n-times anonymous authentication.
Jan Camenisch
Susan Hohenberger
Markulf Kohlweiss
Anna Lysyanskaya
Mira Meyerovich
Coauthors
Aggelos Kiayias
(5)
Akira Takahashi
(2)
Alessandra Scafuro
(1)
Alfredo Pironti
(3)
Alfredo Rial
(2)
Amirreza Sarencheh
(2)
An Nguyen
(1)
Andriy Panchenko
(1)
Anna Lysyanskaya
(7)
Antoine Delignat-Lavaud
(5)
Antonio Faonio
(1)
Aseem Rastogi
(1)
Balthazar Bauer
(1)
Bart De Decker
(1)
Bart Preneel
(2)
Benjamin Beurdouche
(1)
Benjamin Kreuter
(1)
Bernardo David
(4)
Bryan Parno
(4)
Caroline Sheedy
(1)
Cédric Fournet
(16)
Chris Brzuska
(2)
Christer Andersson
(1)
Christina Brzuska
(1)
Christoph Egger
(1)
Christos Gkantsidis
(1)
Claudio Soriente
(1)
Craig Costello
(1)
Daniel Slamanig
(1)
Dario Fiore
(2)
Divya Sharma
(1)
Elena Pagnin
(1)
Elizabeth C. Crites
(1)
Esha Ghosh
(1)
Fabrice Benhamouda
(1)
Felix Engelmann
(2)
Foteini Baldimtsi
(1)
Georg Fuchsbauer
(1)
George Danezis
(5)
Hendrik Waldner
(1)
Hovav Shacham
(1)
Ian Miers
(2)
Jan Bobolz
(2)
Jan Camenisch
(6)
Janno Siim
(2)
Jean Karim Zinzindohoué
(2)
Jens Groth
(4)
Jesus Diaz
(1)
Jianyang Pan
(1)
Jon Howell
(1)
Jonathan Protzenko
(1)
Jorn Lapon
(2)
Karim Baghery
(1)
Karthikeyan Bhargavan
(5)
Kartik Nayak
(1)
Konrad Kohbrok
(2)
Kristiyan Haralambiev
(2)
Leonardo A. Martucci
(1)
Lorenzo Martinico
(1)
Luigi Russo
(1)
Mahak Pancholi
(1)
Mahdi Sedaghat
(1)
Manuel Costa
(1)
Maria Dubovitskaya
(1)
Markulf Kohlweiss
(59)
Mary Maller
(3)
Masayuki Abe
(5)
Matthew Green
(1)
Mehdi Tibouchi
(2)
Melissa Chase
(8)
Michael Naehrig
(1)
Michal Zajac
(1)
Michel Abdalla
(1)
Mikhail Volkhov
(4)
Mira Belenkiy
(2)
Mira Meyerovich
(1)
Miyako Ohkubo
(5)
Nicky Sulmon
(1)
Nikhil Swamy
(1)
Olga Ohrimenko
(2)
Patrick Harasser
(1)
Pierre-Yves Strub
(4)
Pooya Farshim
(2)
Pramod Bhatotia
(1)
Roel Peeters
(1)
Ryo Nishimaki
(3)
Samee Zahur
(1)
Santiago Zanella-Béguelin
(4)
Sarah Meiklejohn
(5)
Sean Bowe
(1)
Susan Hohenberger
(1)
Thomas Kerber
(4)
Tore Kasper Frederiksen
(1)
Varun Madathil
(1)
Vassilis Zikas
(1)
Vincent Naessens
(2)
Yiannis Tselekounis
(1)
Zhengqin Luo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to