What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Lucjan Hanzlik
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Vitārit: Paying for Threshold Services on Bitcoin and Friends.
Sri Aravinda Krishnan Thyagarajan
Easwar Vivek Mangipudi
Lucjan Hanzlik
Aniket Kate
Pratyay Mukherjee
2025
conf/eurocrypt
Non-interactive Blind Signatures from RSA Assumption and More.
Lucjan Hanzlik
Eugenio Paracucchi
Riccardo Zanotto
2024
conf/fc
SoK: Signatures with Randomizable Keys.
Sofía Celi
Scott Griffy
Lucjan Hanzlik
Octavio Perez-Kempner
Daniel Slamanig
2024
conf/sp
Sweep-UC: Swapping Coins Privately.
Lucjan Hanzlik
Julian Loss
Sri Aravinda Krishnan Thyagarajan
Benedikt Wagner
2024
conf/asiaccs
Delegating FIDO Credentials Using Single-use ECDSA Signatures.
Wei-Zhu Yeoh
Lucjan Hanzlik
Oliver Valta
2024
conf/eurocrypt
M&M'S: Mix and Match Attacks on Schnorr-Type Blind Signatures with Repetition.
Khue Do
Lucjan Hanzlik
Eugenio Paracucchi
2023
conf/ccs
Post Quantum Fuzzy Stealth Signatures and Applications.
Sihang Pu
Sri Aravinda Krishnan Thyagarajan
Nico Döttling
Lucjan Hanzlik
2023
conf/ccs
On the Security of Rate-limited Privacy Pass.
Hien Chu
Khue Do
Lucjan Hanzlik
2023
conf/uss
Fast IDentity Online with Anonymous Credentials (FIDO-AC).
Wei-Zhu Yeoh
Michal Kepkowski
Gunnar Heide
Dali Kaafar
Lucjan Hanzlik
2023
conf/fc
McFly: Verifiable Encryption to the Future Made Practical.
Nico Döttling
Lucjan Hanzlik
Bernardo Magri
Stella Wohnig
2023
conf/sp
Token meets Wallet: Formalizing Privacy and Revocation for FIDO2.
Lucjan Hanzlik
Julian Loss
Benedikt Wagner
2023
conf/eurocrypt
Rai-Choo! Evolving Blind Signatures to the Next Level.
Lucjan Hanzlik
Julian Loss
Benedikt Wagner
2023
conf/eurocrypt
Non-interactive Blind Signatures for Random Messages.
Lucjan Hanzlik
2022
journals/popets
How Not to Handle Keys: Timing Attacks on FIDO Authenticator Privacy.
Michal Kepkowski
Lucjan Hanzlik
Ian D. Wood
Mohamed Ali Kâafar
2022
conf/ccs
FeIDo: Recoverable FIDO2 Tokens Using Electronic IDs.
Fabian Schwarz
Khue Do
Gunnar Heide
Lucjan Hanzlik
Christian Rossow
2022
conf/crypto
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More.
Rutchathon Chairattana-Apirom
Lucjan Hanzlik
Julian Loss
Anna Lysyanskaya
Benedikt Wagner
2022
conf/fc
Explainable Arguments.
Lucjan Hanzlik
Kamil Kluczniak
2022
conf/esorics
A Framework for Constructing Single Secret Leader Election from MPC.
Michael Backes
Pascal Berrang
Lucjan Hanzlik
Ivan Pryvalov
2021
conf/ccs
With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
Lucjan Hanzlik
Daniel Slamanig
2020
conf/acns
TrollThrottle - Raising the Cost of Astroturfing.
Ilkan Esiyok
Lucjan Hanzlik
Robert Künnemann
Lena Marie Budde
Michael Backes
2019
conf/ccs
Membership Privacy for Fully Dynamic Group Signatures.
Michael Backes
Lucjan Hanzlik
Jonas Schneider-Bensch
2019
conf/uss
simTPM: User-centric TPM for Mobile Devices.
Dhiman Chakraborty
Lucjan Hanzlik
Sven Bugiel
2019
conf/pkc
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.
Michael Backes
Lucjan Hanzlik
Amir Herzberg
Aniket Kate
Ivan Pryvalov
2019
conf/eurocrypt
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions.
Michael Backes
Nico Döttling
Lucjan Hanzlik
Kamil Kluczniak
Jonas Schneider
2018
conf/asiacrypt
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys.
Michael Backes
Lucjan Hanzlik
Kamil Kluczniak
Jonas Schneider
2017
conf/ccs
Two-Move and Setup-Free Blind Signatures with Perfect Blindness.
Lucjan Hanzlik
Kamil Kluczniak
2016
conf/acisp
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats.
Miroslaw Kutylowski
Lucjan Hanzlik
Kamil Kluczniak
2016
conf/fc
A Short Paper on Blind Signatures from Knowledge Assumptions.
Lucjan Hanzlik
Kamil Kluczniak
2015
conf/ccs
Tracing Attacks on U-Prove with Revocation Mechanism: Tracing Attacks for U-Prove.
Lucjan Hanzlik
Przemyslaw Kubiak
Miroslaw Kutylowski
2015
conf/acns
Recovering Lost Device-Bound Credentials.
Foteini Baldimtsi
Jan Camenisch
Lucjan Hanzlik
Stephan Krenn
Anja Lehmann
Gregory Neven
2014
conf/fc
A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates.
Lucjan Hanzlik
Kamil Kluczniak
2014
conf/fc
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users.
Lucjan Hanzlik
Kamil Kluczniak
Miroslaw Kutylowski
Coauthors
Amir Herzberg
(1)
Aniket Kate
(2)
Anja Lehmann
(1)
Anna Lysyanskaya
(1)
Benedikt Wagner
(4)
Bernardo Magri
(1)
Christian Rossow
(1)
Dali Kaafar
(1)
Daniel Slamanig
(2)
Dhiman Chakraborty
(1)
Easwar Vivek Mangipudi
(1)
Eugenio Paracucchi
(2)
Fabian Schwarz
(1)
Foteini Baldimtsi
(1)
Gregory Neven
(1)
Gunnar Heide
(2)
Hien Chu
(1)
Ian D. Wood
(1)
Ilkan Esiyok
(1)
Ivan Pryvalov
(2)
Jan Camenisch
(1)
Jonas Schneider
(2)
Jonas Schneider-Bensch
(1)
Julian Loss
(4)
Kamil Kluczniak
(8)
Khue Do
(3)
Lena Marie Budde
(1)
Lucjan Hanzlik
(32)
Michael Backes
(6)
Michal Kepkowski
(2)
Miroslaw Kutylowski
(3)
Mohamed Ali Kâafar
(1)
Nico Döttling
(3)
Octavio Perez-Kempner
(1)
Oliver Valta
(1)
Pascal Berrang
(1)
Pratyay Mukherjee
(1)
Przemyslaw Kubiak
(1)
Riccardo Zanotto
(1)
Robert Künnemann
(1)
Rutchathon Chairattana-Apirom
(1)
Scott Griffy
(1)
Sihang Pu
(1)
Sofía Celi
(1)
Sri Aravinda Krishnan Thyagarajan
(3)
Stella Wohnig
(1)
Stephan Krenn
(1)
Sven Bugiel
(1)
Wei-Zhu Yeoh
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to