What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nico Döttling
Google Scholar
59
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Black-Box Non-interactive Zero Knowledge from Vector Trapdoor Hash.
Pedro Branco
Arka Rai Choudhuri
Nico Döttling
Abhishek Jain
Giulio Malavolta
Akshayaram Srinivasan
2025
conf/crypto
Rate-1 Statistical Non-interactive Zero-Knowledge.
Pedro Branco
Nico Döttling
Akshayaram Srinivasan
2025
conf/crypto
Simple and General Counterexamples for Private-Coin Evasive LWE.
Nico Döttling
Abhishek Jain
Giulio Malavolta
Surya Mathialagan
Vinod Vaikuntanathan
2025
conf/crypto
Pseudorandom Obfuscation and Applications.
Pedro Branco
Nico Döttling
Abhishek Jain
Giulio Malavolta
Surya Mathialagan
Spencer Peters
Vinod Vaikuntanathan
2024
conf/acns
Practical Lattice-Based Distributed Signatures for a Small Number of Signers.
Nabil Alkeilani Alkadri
Nico Döttling
Sihang Pu
2024
conf/pkc
Rate-1 Fully Local Somewhere Extractable Hashing from DDH.
Pedro Branco
Nico Döttling
Akshayaram Srinivasan
Riccardo Zanotto
2024
conf/eurocrypt
Two-Round Maliciously-Secure Oblivious Transfer with Optimal Rate.
Pedro Branco
Nico Döttling
Akshayaram Srinivasan
2024
conf/asiacrypt
Signature-Based Witness Encryption with Compact Ciphertext.
Gennaro Avitabile
Nico Döttling
Bernardo Magri
Christos Sakkas
Stella Wohnig
2024
conf/tcc
Space-Lock Puzzles and Verifiable Space-Hard Functions from Root-Finding in Sparse Polynomials.
Nico Döttling
Jesko Dujmovic
Antoine Joux
2023
journals/joc
Candidate iO from Homomorphic Encryption Schemes.
Zvika Brakerski
Nico Döttling
Sanjam Garg
Giulio Malavolta
2023
conf/ccs
Post Quantum Fuzzy Stealth Signatures and Applications.
Sihang Pu
Sri Aravinda Krishnan Thyagarajan
Nico Döttling
Lucjan Hanzlik
2023
conf/crypto
A Framework for Statistically Sender Private OT with Optimal Rate.
Pedro Branco
Nico Döttling
Akshayaram Srinivasan
2023
conf/fc
McFly: Verifiable Encryption to the Future Made Practical.
Nico Döttling
Lucjan Hanzlik
Bernardo Magri
Stella Wohnig
2023
conf/pkc
Laconic Function Evaluation for Turing Machines.
Nico Döttling
Phillip Gajland
Giulio Malavolta
2023
conf/eurocrypt
Efficient Laconic Cryptography from Learning with Errors.
Nico Döttling
Dimitris Kolonelos
Russell W. F. Lai
Chuanwei Lin
Giulio Malavolta
Ahmadreza Rahimi
2022
conf/pkc
Two-Round Oblivious Linear Evaluation from Learning with Errors.
Pedro Branco
Nico Döttling
Paulo Mateus
2022
conf/eurocrypt
Batch-OT with Optimal Rate.
Zvika Brakerski
Pedro Branco
Nico Döttling
Sihang Pu
2022
conf/asiacrypt
Universal Ring Signatures in the Standard Model.
Pedro Branco
Nico Döttling
Stella Wohnig
2022
conf/tcc
IBE with Incompressible Master Secret and Small Identity Secrets.
Nico Döttling
Sanjam Garg
Sruthi Sekar
Mingyuan Wang
2022
conf/tcc
Rate-1 Incompressible Encryption from Standard Assumptions.
Pedro Branco
Nico Döttling
Jesko Dujmovic
2021
conf/pkc
Multiparty Cardinality Testing for Threshold Private Intersection.
Pedro Branco
Nico Döttling
Sihang Pu
2021
conf/pkc
Universal Proxy Re-Encryption.
Nico Döttling
Ryo Nishimaki
2021
conf/tcc
Laconic Private Set Intersection and Applications.
Navid Alamati
Pedro Branco
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Sihang Pu
2021
conf/tcc
On the Impossibility of Purely Algebraic Signatures.
Nico Döttling
Dominik Hartmann
Dennis Hofheinz
Eike Kiltz
Sven Schäge
Bogdan Ursu
2021
conf/tcc
Rate-1 Quantum Fully Homomorphic Encryption.
Orestis Chardouvelis
Nico Döttling
Giulio Malavolta
2020
conf/ccs
Verifiable Timed Signatures Made Practical.
Sri Aravinda Krishnan Thyagarajan
Adithya Bhat
Giulio Malavolta
Nico Döttling
Aniket Kate
Dominique Schröder
2020
conf/acns
Minting Mechanism for Proof of Stake Blockchains.
Dominic Deuber
Nico Döttling
Bernardo Magri
Giulio Malavolta
Sri Aravinda Krishnan Thyagarajan
2020
conf/eurocrypt
Candidate iO from Homomorphic Encryption Schemes.
Zvika Brakerski
Nico Döttling
Sanjam Garg
Giulio Malavolta
2020
conf/eurocrypt
Hardness of LWE on General Entropic Distributions.
Zvika Brakerski
Nico Döttling
2020
conf/eurocrypt
Two-Round Oblivious Transfer from CDH or LPN.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Daniel Masny
Daniel Wichs
2020
conf/asiacrypt
A Combinatorial Approach to Quantum Random Functions.
Nico Döttling
Giulio Malavolta
Sihang Pu
2020
conf/tcc
Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
Zvika Brakerski
Pedro Branco
Nico Döttling
Sanjam Garg
Giulio Malavolta
2020
conf/tcc
Lossiness and Entropic Hardness for Ring-LWE.
Zvika Brakerski
Nico Döttling
2019
conf/crypto
Trapdoor Hash Functions and Their Applications.
Nico Döttling
Sanjam Garg
Yuval Ishai
Giulio Malavolta
Tamer Mour
Rafail Ostrovsky
2019
conf/eurocrypt
Ring Signatures: Logarithmic-Size, No Setup - from Standard Assumptions.
Michael Backes
Nico Döttling
Lucjan Hanzlik
Kamil Kluczniak
Jonas Schneider
2019
conf/eurocrypt
Incremental Proofs of Sequential Work.
Nico Döttling
Russell W. F. Lai
Giulio Malavolta
2019
conf/eurocrypt
Continuous Non-Malleable Codes in the 8-Split-State Model.
Divesh Aggarwal
Nico Döttling
Jesper Buus Nielsen
Maciej Obremski
Erick Purwanto
2019
conf/asiacrypt
Efficient UC Commitment Extension with Homomorphism for Free (and Applications).
Ignacio Cascudo
Ivan Damgård
Bernardo David
Nico Döttling
Rafael Dowsley
Irene Giacomelli
2019
conf/asiacrypt
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Kevin Liu
Giulio Malavolta
2019
conf/tcc
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
Zvika Brakerski
Nico Döttling
Sanjam Garg
Giulio Malavolta
2018
conf/pkc
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Daniel Masny
2018
conf/tcc
Two-Message Statistically Sender-Private OT from LWE.
Zvika Brakerski
Nico Döttling
2017
conf/ccs
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Nico Döttling
Satrajit Ghosh
Jesper Buus Nielsen
Tobias Nilges
Roberto Trifiletti
2017
conf/crypto
Laconic Oblivious Transfer and Its Applications.
Chongwon Cho
Nico Döttling
Sanjam Garg
Divya Gupta
Peihan Miao
Antigoni Polychroniadou
2017
conf/crypto
Identity-Based Encryption from the Diffie-Hellman Assumption.
Nico Döttling
Sanjam Garg
2017
conf/eurocrypt
Concurrently Composable Security with Shielded Super-Polynomial Simulators.
Brandon Broadnax
Nico Döttling
Gunnar Hartung
Jörn Müller-Quade
Matthias Nagel
2017
conf/tcc
From Selective IBE to Full IBE and Selective HIBE.
Nico Döttling
Sanjam Garg
2016
conf/crypto
Rate-1, Linear Time and Additively Homomorphic UC Commitments.
Ignacio Cascudo
Ivan Damgård
Bernardo David
Nico Döttling
Jesper Buus Nielsen
2016
conf/crypto
Two-Message, Oblivious Evaluation of Cryptographic Functionalities.
Nico Döttling
Nils Fleischhacker
Johannes Krupp
Dominique Schröder
2015
conf/crypto
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
Nico Döttling
Dominique Schröder
2015
conf/provsec
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
Nico Döttling
Daniel Kraschewski
Jörn Müller-Quade
Tobias Nilges
2015
conf/pkc
Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification.
Nico Döttling
2015
conf/eurocrypt
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions.
Ronald Cramer
Ivan Bjerre Damgård
Nico Döttling
Serge Fehr
Gabriele Spini
2015
conf/tcc
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
Nico Döttling
Daniel Kraschewski
Jörn Müller-Quade
Tobias Nilges
2013
conf/eurocrypt
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Nico Döttling
Jörn Müller-Quade
2013
conf/tcc
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Nico Döttling
Thilo Mie
Jörn Müller-Quade
Tobias Nilges
2012
conf/asiacrypt
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Nico Döttling
Jörn Müller-Quade
Anderson C. A. Nascimento
2011
conf/tcc
Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Nico Döttling
Daniel Kraschewski
Jörn Müller-Quade
2010
conf/wisa
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
Nico Döttling
Dejan E. Lazich
Jörn Müller-Quade
Antonio Sobreira de Almeida
Coauthors
Abhishek Jain
(3)
Adithya Bhat
(1)
Ahmadreza Rahimi
(1)
Akshayaram Srinivasan
(5)
Anderson C. A. Nascimento
(1)
Aniket Kate
(1)
Antigoni Polychroniadou
(1)
Antoine Joux
(1)
Antonio Sobreira de Almeida
(1)
Arka Rai Choudhuri
(1)
Bernardo David
(2)
Bernardo Magri
(3)
Bogdan Ursu
(1)
Brandon Broadnax
(1)
Chongwon Cho
(1)
Christos Sakkas
(1)
Chuanwei Lin
(1)
Daniel Kraschewski
(3)
Daniel Masny
(2)
Daniel Wichs
(1)
Dejan E. Lazich
(1)
Dennis Hofheinz
(1)
Dimitris Kolonelos
(1)
Divesh Aggarwal
(1)
Divya Gupta
(1)
Dominic Deuber
(1)
Dominik Hartmann
(1)
Dominique Schröder
(3)
Eike Kiltz
(1)
Erick Purwanto
(1)
Gabriele Spini
(1)
Gennaro Avitabile
(1)
Giulio Malavolta
(16)
Gunnar Hartung
(1)
Ignacio Cascudo
(2)
Irene Giacomelli
(1)
Ivan Bjerre Damgård
(1)
Ivan Damgård
(2)
Jesko Dujmovic
(2)
Jesper Buus Nielsen
(3)
Johannes Krupp
(1)
Jonas Schneider
(1)
Jörn Müller-Quade
(8)
Kamil Kluczniak
(1)
Kevin Liu
(1)
Lucjan Hanzlik
(3)
Maciej Obremski
(1)
Matthias Nagel
(1)
Michael Backes
(1)
Mingyuan Wang
(1)
Mohammad Hajiabadi
(4)
Nabil Alkeilani Alkadri
(1)
Navid Alamati
(1)
Nico Döttling
(59)
Nils Fleischhacker
(1)
Orestis Chardouvelis
(1)
Paulo Mateus
(1)
Pedro Branco
(13)
Peihan Miao
(1)
Phillip Gajland
(1)
Rafael Dowsley
(1)
Rafail Ostrovsky
(1)
Riccardo Zanotto
(1)
Roberto Trifiletti
(1)
Ronald Cramer
(1)
Russell W. F. Lai
(2)
Ryo Nishimaki
(1)
Sanjam Garg
(13)
Satrajit Ghosh
(1)
Serge Fehr
(1)
Sihang Pu
(6)
Spencer Peters
(1)
Sri Aravinda Krishnan Thyagarajan
(3)
Sruthi Sekar
(1)
Stella Wohnig
(3)
Surya Mathialagan
(2)
Sven Schäge
(1)
Tamer Mour
(1)
Thilo Mie
(1)
Tobias Nilges
(4)
Vinod Vaikuntanathan
(2)
Yuval Ishai
(1)
Zvika Brakerski
(8)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to