What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lisa Kohl
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
Scalable and Fine-Tuned Privacy Pass from Group Verifiable Random Functions.
Dennis Faut
Julia Hesse
Lisa Kohl
Andy Rupp
2024
journals/cic
Communication-Efficient Multi-Party Computation for RMS Programs.
Thomas Attema
Aron van Baarsen
Stefan van den Berg
Pedro Capitão
Vincent Dunning
Lisa Kohl
2024
journals/popets
Extending the Security of SPDZ with Fairness.
Bart Veldhuizen
Gabriele Spini
Thijs Veugen
Lisa Kohl
2024
conf/asiacrypt
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism.
Elette Boyle
Lisa Kohl
Zhe Li
Peter Scholl
2023
journals/joc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2023
conf/pkc
On Homomorphic Secret Sharing from Polynomial-Modulus LWE.
Thomas Attema
Pedro Capitão
Lisa Kohl
2023
conf/eurocrypt
Oblivious Transfer with Constant Computational Overhead.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Nicolas Resch
Peter Scholl
2023
conf/tcc
Towards Topology-Hiding Computation from Oblivious Transfer.
Marshall Ball
Alexander Bienstock
Lisa Kohl
Pierre Meyer
2022
conf/crypto
Correlated Pseudorandomness from Expand-Accumulate Codes.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Nicolas Resch
Peter Scholl
2021
conf/crypto
A Compressed $\varSigma $-Protocol Theory for Lattices.
Thomas Attema
Ronald Cramer
Lisa Kohl
2021
conf/crypto
Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2021
conf/tcc
Towards Tight Adaptive Security of Non-interactive Key Exchange.
Julia Hesse
Dennis Hofheinz
Lisa Kohl
Roman Langrehr
2020
conf/crypto
Efficient Pseudorandom Correlation Generators from Ring-LPN.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2020
conf/tcc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2019
conf/ccs
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Rindal
Peter Scholl
2019
conf/crypto
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2019
conf/pkc
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs.
Lisa Kohl
2019
conf/eurocrypt
Homomorphic Secret Sharing from Lattices Without FHE.
Elette Boyle
Lisa Kohl
Peter Scholl
2018
conf/crypto
On Tightly Secure Non-Interactive Key Exchange.
Julia Hesse
Dennis Hofheinz
Lisa Kohl
2018
conf/eurocrypt
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures.
Romain Gay
Dennis Hofheinz
Lisa Kohl
Jiaxin Pan
2017
conf/crypto
Kurosawa-Desmedt Meets Tight Security.
Romain Gay
Dennis Hofheinz
Lisa Kohl
Coauthors
Alexander Bienstock
(1)
Andy Rupp
(1)
Aron van Baarsen
(1)
Bart Veldhuizen
(1)
Dennis Faut
(1)
Dennis Hofheinz
(4)
Elette Boyle
(10)
Gabriele Spini
(1)
Geoffroy Couteau
(6)
Jiaxin Pan
(1)
Julia Hesse
(3)
Lisa Kohl
(21)
Marshall Ball
(3)
Nicolas Resch
(2)
Niv Gilboa
(6)
Pedro Capitão
(2)
Peter Rindal
(1)
Peter Scholl
(8)
Pierre Meyer
(3)
Ran Cohen
(2)
Romain Gay
(2)
Roman Langrehr
(1)
Ronald Cramer
(1)
Stefan van den Berg
(1)
Tal Malkin
(2)
Tal Moran
(2)
Thijs Veugen
(1)
Thomas Attema
(3)
Vincent Dunning
(1)
Yuval Ishai
(6)
Zhe Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to