Edit Profile (opens in new tab) Kiltz, Eike Compute Distance To: Compute Author ID: kiltz.eike Published as: Kiltz, Eike External Links: MGP · Wikidata · dblp · GND · IdRef · theses.fr Documents Indexed: 100 Publications since 2001, including 1 Book 3 Contributions as Editor Co-Authors: 106 Co-Authors with 95 Joint Publications 2,367 Co-Co-Authors all top 5 Co-Authors 8 single-authored 21 Hofheinz, Dennis 11 Pietrzak, Krzysztof 9 Cash, David M. 6 Jager, Tibor 6 Pan, Jiaxin 5 Bellare, Mihir 5 Galindo, David 5 Schäge, Sven 4 Auerbach, Benedikt 4 Cramer, Ronald John Fitzgerald 4 Herranz, Javier 4 Kakvi, Saqib A. 4 Loss, Julian 4 Malone-Lee, John 4 Shoup, Victor 4 Vaikuntanathan, Vinod 4 Wee, Hoeteck 3 Abe, Masayuki 3 Damgård, Ivan Bjerre 3 Hauck, Eduard 3 Neven, Gregory 3 O’Neill, Adam 3 Peikert, Chris 3 Poettering, Bertram 3 Riepel, Doreen 2 Abdalla, Michel 2 Blazy, Olivier 2 Catalano, Dario 2 Escala, Alex 2 Fersch, Manuel 2 Freeman, David Mandell 2 Fuchsbauer, Georg 2 Giacon, Federico 2 Goldreich, Oded 2 Herold, Gottfried 2 Heuer, Felix 2 Hövelmanns, Kathrin 2 Imai, Hideki 2 Jain, Abhishek 2 Kohno, Tadayoshi 2 Lange, Tanja 2 Lyubashevsky, Vadim 2 Masny, Daniel 2 Mohassel, Payman 2 Okamoto, Tatsuaki 2 Paillier, Pascal 2 Ràfols, Carla 2 Rosen, Alon 2 Segev, Gil 2 Shi, Haixia 2 Simon, Hans-Ulrich 2 Venturi, Daniele 2 Villar, Jorge Luis 2 Winterhof, Arne 2 Yung, Moti 1 Alwen, Joël 1 Bader, Christoph 1 Blanchet, Bruno 1 Choi, Seung Geol 1 Cui, Yang 1 Dodis, Yevgeniy 1 Döttling, Nico 1 Dowsley, Rafael 1 Faust, Sebastian 1 Fehr, Serge 1 Fitzi, Matthias 1 Franklin, Matthew K. 1 Freire, Eduarda S. V. 1 Gay, Romain 1 Han, Shuai 1 Hanaoka, Goichiro 1 Haralambiev, Kristiyan 1 Hartmann, Dominik 1 Heyse, Stefan 1 Hwang, Jung Yeon 1 Leander, Gregor 1 Li, Yong 1 Lipp, Benjamin 1 Liu, Shengli 1 May, Alexander 1 Mityagin, Anton 1 Ngoc Khanh Nguyen 1 Nielsen, Jesper Buus 1 Paar, Christof 1 Padró, Carles 1 Panjwani, Saurabh 1 Pass, Rafael 1 Paterson, Kenneth G. 1 Raghavan, Barath 1 Rothblum, Guy N. 1 Schaffner, Christian 1 Schoenen, Stefan 1 Shelat, Abhi 1 Stam, Martijn 1 Szegedy, Mario 1 Tessaro, Stefano 1 Thorbek, Rune 1 Toft, Tomas 1 Unruh, Dominique 1 Ursu, Bogdan ...and 6 more Co-Authors all top 5 Serials 11 Journal of Cryptology 3 Lecture Notes in Computer Science 1 Bulletin of the Australian Mathematical Society 1 Discrete Applied Mathematics 1 Information Processing Letters 1 Journal of Computer and System Sciences 1 Theoretical Computer Science 1 Information and Computation 1 Designs, Codes and Cryptography 1 Advances in Mathematics of Communications all top 5 Fields 100 Information and communication theory, circuits (94-XX) 14 Computer science (68-XX) 3 General and overarching topics; collections (00-XX) 3 Number theory (11-XX) 2 Linear and multilinear algebra; matrix theory (15-XX) 2 Numerical analysis (65-XX) 2 Quantum theory (81-XX) 1 Mathematical logic and foundations (03-XX) 1 Combinatorics (05-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Commutative algebra (13-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 95 Publications have been cited 1,425 times in 801 Documents Cited by ▼ Year ▼ Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 102 2010 An algebraic framework for Diffie-Hellman assumptions. Zbl 1316.94070Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge 85 2013 Secure hybrid encryption from weakened key encapsulation. Zbl 1215.94051Hofheinz, Dennis; Kiltz, Eike 56 2007 A modular analysis of the Fujisaki-Okamoto transformation. Zbl 1410.94082Hofheinz, Dennis; Hövelmanns, Kathrin; Kiltz, Eike 55 2017 Chosen-ciphertext security from tag-based encryption. Zbl 1113.94008Kiltz, Eike 52 2006 (Hierarchical) identity-based encryption from affine message authentication. Zbl 1345.94044Blazy, Olivier; Kiltz, Eike; Pan, Jiaxin 44 2014 Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1145.94430Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia 40 2005 The twin Diffie-Hellman problem and applications. Zbl 1149.94307Cash, David; Kiltz, Eike; Shoup, Victor 39 2008 The algebraic group model and its applications. Zbl 1430.94068Fuchsbauer, Georg; Kiltz, Eike; Loss, Julian 37 2018 Tightly CCA-secure encryption without pairings. Zbl 1347.94032Gay, Romain; Hofheinz, Dennis; Kiltz, Eike; Wee, Hoeteck 34 2016 Quasi-adaptive NIZK for linear subspaces revisited. Zbl 1326.94103Kiltz, Eike; Wee, Hoeteck 34 2015 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 30 2012 Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia 28 2008 A new randomness extraction paradigm for hybrid encryption. Zbl 1239.94055Kiltz, Eike; Pietrzak, Krzysztof; Stam, Martijn; Yung, Moti 27 2009 Tightly-secure authenticated key exchange. Zbl 1359.94571Bader, Christoph; Hofheinz, Dennis; Jager, Tibor; Kiltz, Eike; Li, Yong 27 2015 Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas 26 2006 Programmable hash functions and their applications. Zbl 1183.94052Hofheinz, Dennis; Kiltz, Eike 25 2008 Leakage-resilient signatures. Zbl 1274.94135Faust, Sebastian; Kiltz, Eike; Pietrzak, Krzysztof; Rothblum, Guy N. 24 2010 Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman. Zbl 1127.94016Kiltz, Eike 21 2007 Optimal security proofs for signatures from identification schemes. Zbl 1391.94768Kiltz, Eike; Masny, Daniel; Pan, Jiaxin 20 2016 A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model. Zbl 1415.94448Kiltz, Eike; Lyubashevsky, Vadim; Schaffner, Christian 20 2018 Encryption schemes secure against chosen-ciphertext selective opening attacks. Zbl 1280.94052Fehr, Serge; Hofheinz, Dennis; Kiltz, Eike; Wee, Hoeteck 20 2010 Structure-preserving signatures from standard assumptions, revisited. Zbl 1352.94043Kiltz, Eike; Pan, Jiaxin; Wee, Hoeteck 19 2015 Message authentication, revisited. Zbl 1297.94117Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel 19 2012 The group of signed quadratic residues and applications. Zbl 1252.94073Hofheinz, Dennis; Kiltz, Eike 18 2009 An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge 18 2017 More constructions of lossy and correlation-secure trapdoor functions. Zbl 1281.94024Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil 17 2010 Practical chosen ciphertext secure encryption from factoring. Zbl 1239.94052Hofheinz, Dennis; Kiltz, Eike 16 2009 CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption. Zbl 1153.94400Kiltz, Eike; Vahlis, Yevgeniy 16 2008 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 16 2007 Tightly-secure signatures from chameleon hash functions. Zbl 1345.94043Blazy, Olivier; Kakvi, Saqib A.; Kiltz, Eike; Pan, Jiaxin 16 2015 Instantiability of RSA-OAEP under chosen-plaintext attack. Zbl 1280.94077Kiltz, Eike; O’Neill, Adam; Smith, Adam 16 2010 Optimal security proofs for full domain hash, revisited. Zbl 1297.94118Kakvi, Saqib A.; Kiltz, Eike 15 2012 Adaptive trapdoor functions and chosen-ciphertext security. Zbl 1280.94076Kiltz, Eike; Mohassel, Payman; O’Neill, Adam 15 2010 Short signatures from weaker assumptions. Zbl 1227.94079Hofheinz, Dennis; Jager, Tibor; Kiltz, Eike 15 2011 On the generic construction of identity-based signatures with additional properties. Zbl 1172.94575Galindo, David; Herranz, Javier; Kiltz, Eike 14 2006 Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent 14 2012 Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Zbl 1176.94046Kiltz, Eike; Galindo, David 13 2006 Programmable hash functions and their applications. Zbl 1272.94036Hofheinz, Dennis; Kiltz, Eike 13 2012 Leakage resilient ElGamal encryption. Zbl 1290.94103Kiltz, Eike; Pietrzak, Krzysztof 13 2010 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 13 2011 Tightly-secure authenticated key exchange, revisited. Zbl 1479.94325Jager, Tibor; Kiltz, Eike; Riepel, Doreen; Schäge, Sven 12 2021 Lapin: an efficient authentication protocol based on ring-LPN. Zbl 1282.94078Heyse, Stefan; Kiltz, Eike; Lyubashevsky, Vadim; Paar, Christof; Pietrzak, Krzysztof 12 2012 More constructions of lossy and correlation-secure trapdoor functions. Zbl 1291.94083Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil 12 2013 Simple chosen-ciphertext security from low-noise LPN. Zbl 1335.94059Kiltz, Eike; Masny, Daniel; Pietrzak, Krzysztof 11 2014 The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Zbl 1200.94042Choi, Seung Geol; Herranz, Javier; Hofheinz, Dennis; Hwang, Jung Yeon; Kiltz, Eike; Lee, Dong Hoon; Yung, Moti 10 2009 Public-key encryption with non-interactive opening. Zbl 1161.94393Damgård, Ivan; Hofheinz, Dennis; Kiltz, Eike; Thorbek, Rune 9 2008 Generic authenticated key exchange in the quantum random oracle model. Zbl 1481.94144Hövelmanns, Kathrin; Kiltz, Eike; Schäge, Sven; Unruh, Dominique 9 2020 Some (in)sufficient conditions for secure hybrid encryption. Zbl 1205.68148Herranz, Javier; Hofheinz, Dennis; Kiltz, Eike 9 2010 Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model. Zbl 1271.94020Haralambiev, Kristiyan; Jager, Tibor; Kiltz, Eike; Shoup, Victor 9 2010 Non-interactive key exchange. Zbl 1314.94069Freire, Eduarda S. V.; Hofheinz, Dennis; Kiltz, Eike; Paterson, Kenneth G. 9 2013 Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem. Zbl 1092.94024Kiltz, Eike; Winterhof, Arne 8 2006 On the selective opening security of practical public-key encryption schemes. Zbl 1345.94067Heuer, Felix; Jager, Tibor; Kiltz, Eike; Schäge, Sven 8 2015 Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Zbl 1194.68111Kiltz, Eike; Galindo, David 8 2009 Efficient hybrid encryption from ID-based encryption. Zbl 1197.94171Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike 8 2010 Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? Zbl 1308.94059Bellare, Mihir; Hofheinz, Dennis; Kiltz, Eike 7 2015 A modular treatment of blind signatures from identification schemes. Zbl 07162733Hauck, Eduard; Kiltz, Eike; Loss, Julian 7 2019 Digital signatures with minimal overhead from indifferentiable random invertible functions. Zbl 1310.94156Kiltz, Eike; Pietrzak, Krzysztof; Szegedy, Mario 7 2013 Standard security does imply security against selective opening for Markov distributions. Zbl 1348.94046Fuchsbauer, Georg; Heuer, Felix; Kiltz, Eike; Pietrzak, Krzysztof 6 2016 On the interpolation of bivariate polynomials related to the Diffie-Hellman mapping. Zbl 1070.11055Kiltz, Eike; Winterhof, Arne 6 2004 Secure linear algebra using linearly recurrent sequences. Zbl 1129.94028Kiltz, Eike; Mohassel, Payman; Weinreb, Enav; Franklin, Matthew 6 2007 Hybrid encryption in a multi-user setting, revisited. Zbl 1385.94038Giacon, Federico; Kiltz, Eike; Poettering, Bertram 6 2018 Practical chosen ciphertext secure encryption from factoring. Zbl 1291.94097Hofheinz, Dennis; Kiltz, Eike; Shoup, Victor 6 2013 On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. Zbl 1239.94054Kiltz, Eike; Pietrzak, Krzysztof 5 2009 A tool box of cryptographic functions realted to the Diffie-Hellman function. Zbl 1011.94542Kiltz, Eike 5 2001 Chosen ciphertext security with optimal ciphertext overhead. Zbl 1206.94047Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki 5 2008 Memory-tight reductions. Zbl 1407.94076Auerbach, Benedikt; Cash, David; Fersch, Manuel; Kiltz, Eike 5 2017 Certifying RSA. Zbl 1292.94087Kakvi, Saqib A.; Kiltz, Eike; May, Alexander 5 2012 Two-round man-in-the-middle security from LPN. Zbl 1378.94074Cash, David; Kiltz, Eike; Tessaro, Stefano 4 2016 A note on secure computation of the Moore-Penrose pseudoinverse and its application to secure linear algebra. Zbl 1215.68034Cramer, Ronald; Kiltz, Eike; Padró, Carles 4 2007 On the limitations of the spread of an IBE-to-PKE transformation. Zbl 1151.94526Kiltz, Eike 4 2006 Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles. Zbl 1152.94419Galindo, David; Kiltz, Eike 4 2006 On the one-per-message unforgeability of (EC)DSA and its variants. Zbl 1406.94052Fersch, Manuel; Kiltz, Eike; Poettering, Bertram 4 2017 Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups. Zbl 1385.94008Auerbach, Benedikt; Bellare, Mihir; Kiltz, Eike 4 2018 Lattice-based blind signatures, revisited. Zbl 1504.94213Hauck, Eduard; Kiltz, Eike; Loss, Julian; Ngoc Khanh Nguyen 4 2020 The twin Diffie-Hellman problem and applications. Zbl 1220.94034Cash, David; Kiltz, Eike; Shoup, Victor 4 2009 Append-only signatures. Zbl 1082.94541Kiltz, Eike; Mityagin, Anton; Panjwani, Saurabh; Raghavan, Barath 4 2005 A twist on the Naor-Yung paradigm and its application to efficient CCA-secure encryption from hard search problems. Zbl 1274.94057Cramer, Ronald; Hofheinz, Dennis; Kiltz, Eike 4 2010 Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven 3 2021 A primitive for proving the security of every bit and about universal hash functions & hard core bits. Zbl 0999.94520Kiltz, Eike 3 2001 Identity-based signatures. Zbl 1159.68443Kiltz, Eike; Neven, Gregory 3 2009 A general construction of IND-CCA2 secure public key encryption. Zbl 1123.94350Kiltz, Eike; Malone-Lee, John 3 2003 Tightly-secure signatures from five-move identification protocols. Zbl 1417.94068Kiltz, Eike; Loss, Julian; Pan, Jiaxin 3 2017 Analysing the HPKE standard. Zbl 1479.94109Alwen, Joël; Blanchet, Bruno; Hauck, Eduard; Kiltz, Eike; Lipp, Benjamin; Riepel, Doreen 2 2021 On the representation of Boolean predicates of the Diffie-Hellman function. Zbl 1039.94541Kiltz, Eike 2 2003 Optimal security proofs for full domain hash. Revisited. Zbl 1426.94106Kakvi, Saqib A.; Kiltz, Eike 2 2018 Everybody’s a target: scalability in public-key encryption. Zbl 1479.94117Auerbach, Benedikt; Giacon, Federico; Kiltz, Eike 2 2020 Instantiability of RSA-OAEP under chosen-plaintext attack. Zbl 1377.94056Kiltz, Eike; O’Neill, Adam; Smith, Adam 2 2017 Secure computation of the mean and related statistics. Zbl 1079.94556Kiltz, Eike; Leander, Gregor; Malone-Lee, John 2 2005 Compact CCA-secure encryption for messages of arbitrary length. Zbl 1227.94020Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki 1 2009 Efficient authentication from hard learning problems. Zbl 1386.94096Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek 1 2017 Digital signatures from strong RSA without prime generation. Zbl 1345.94048Cash, David; Dowsley, Rafael; Kiltz, Eike 1 2015 Complexity theoretic lower bounds on cryptographic functions. Zbl 1189.68066Kiltz, Eike 1 2003 Complexity theoretic aspects of some cryptographic functions. Zbl 1276.94018Kiltz, Eike; Simon, Hans Ulrich 1 2003 On the impossibility of purely algebraic signatures. Zbl 07674407Döttling, Nico; Hartmann, Dominik; Hofheinz, Dennis; Kiltz, Eike; Schäge, Sven; Ursu, Bogdan 1 2021 Tightly-secure authenticated key exchange, revisited. Zbl 1479.94325Jager, Tibor; Kiltz, Eike; Riepel, Doreen; Schäge, Sven 12 2021 Authenticated key exchange and signatures with tight security in the standard model. Zbl 1489.94123Han, Shuai; Jager, Tibor; Kiltz, Eike; Liu, Shengli; Pan, Jiaxin; Riepel, Doreen; Schäge, Sven 3 2021 Analysing the HPKE standard. Zbl 1479.94109Alwen, Joël; Blanchet, Bruno; Hauck, Eduard; Kiltz, Eike; Lipp, Benjamin; Riepel, Doreen 2 2021 On the impossibility of purely algebraic signatures. Zbl 07674407Döttling, Nico; Hartmann, Dominik; Hofheinz, Dennis; Kiltz, Eike; Schäge, Sven; Ursu, Bogdan 1 2021 Generic authenticated key exchange in the quantum random oracle model. Zbl 1481.94144Hövelmanns, Kathrin; Kiltz, Eike; Schäge, Sven; Unruh, Dominique 9 2020 Lattice-based blind signatures, revisited. Zbl 1504.94213Hauck, Eduard; Kiltz, Eike; Loss, Julian; Ngoc Khanh Nguyen 4 2020 Everybody’s a target: scalability in public-key encryption. Zbl 1479.94117Auerbach, Benedikt; Giacon, Federico; Kiltz, Eike 2 2020 A modular treatment of blind signatures from identification schemes. Zbl 07162733Hauck, Eduard; Kiltz, Eike; Loss, Julian 7 2019 The algebraic group model and its applications. Zbl 1430.94068Fuchsbauer, Georg; Kiltz, Eike; Loss, Julian 37 2018 A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model. Zbl 1415.94448Kiltz, Eike; Lyubashevsky, Vadim; Schaffner, Christian 20 2018 Hybrid encryption in a multi-user setting, revisited. Zbl 1385.94038Giacon, Federico; Kiltz, Eike; Poettering, Bertram 6 2018 Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups. Zbl 1385.94008Auerbach, Benedikt; Bellare, Mihir; Kiltz, Eike 4 2018 Optimal security proofs for full domain hash. Revisited. Zbl 1426.94106Kakvi, Saqib A.; Kiltz, Eike 2 2018 A modular analysis of the Fujisaki-Okamoto transformation. Zbl 1410.94082Hofheinz, Dennis; Hövelmanns, Kathrin; Kiltz, Eike 55 2017 An algebraic framework for Diffie-Hellman assumptions. Zbl 1370.94510Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge 18 2017 Memory-tight reductions. Zbl 1407.94076Auerbach, Benedikt; Cash, David; Fersch, Manuel; Kiltz, Eike 5 2017 On the one-per-message unforgeability of (EC)DSA and its variants. Zbl 1406.94052Fersch, Manuel; Kiltz, Eike; Poettering, Bertram 4 2017 Tightly-secure signatures from five-move identification protocols. Zbl 1417.94068Kiltz, Eike; Loss, Julian; Pan, Jiaxin 3 2017 Instantiability of RSA-OAEP under chosen-plaintext attack. Zbl 1377.94056Kiltz, Eike; O’Neill, Adam; Smith, Adam 2 2017 Efficient authentication from hard learning problems. Zbl 1386.94096Kiltz, Eike; Pietrzak, Krzysztof; Venturi, Daniele; Cash, David; Jain, Abhishek 1 2017 Tightly CCA-secure encryption without pairings. Zbl 1347.94032Gay, Romain; Hofheinz, Dennis; Kiltz, Eike; Wee, Hoeteck 34 2016 Optimal security proofs for signatures from identification schemes. Zbl 1391.94768Kiltz, Eike; Masny, Daniel; Pan, Jiaxin 20 2016 Standard security does imply security against selective opening for Markov distributions. Zbl 1348.94046Fuchsbauer, Georg; Heuer, Felix; Kiltz, Eike; Pietrzak, Krzysztof 6 2016 Two-round man-in-the-middle security from LPN. Zbl 1378.94074Cash, David; Kiltz, Eike; Tessaro, Stefano 4 2016 Quasi-adaptive NIZK for linear subspaces revisited. Zbl 1326.94103Kiltz, Eike; Wee, Hoeteck 34 2015 Tightly-secure authenticated key exchange. Zbl 1359.94571Bader, Christoph; Hofheinz, Dennis; Jager, Tibor; Kiltz, Eike; Li, Yong 27 2015 Structure-preserving signatures from standard assumptions, revisited. Zbl 1352.94043Kiltz, Eike; Pan, Jiaxin; Wee, Hoeteck 19 2015 Tightly-secure signatures from chameleon hash functions. Zbl 1345.94043Blazy, Olivier; Kakvi, Saqib A.; Kiltz, Eike; Pan, Jiaxin 16 2015 On the selective opening security of practical public-key encryption schemes. Zbl 1345.94067Heuer, Felix; Jager, Tibor; Kiltz, Eike; Schäge, Sven 8 2015 Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? Zbl 1308.94059Bellare, Mihir; Hofheinz, Dennis; Kiltz, Eike 7 2015 Digital signatures from strong RSA without prime generation. Zbl 1345.94048Cash, David; Dowsley, Rafael; Kiltz, Eike 1 2015 (Hierarchical) identity-based encryption from affine message authentication. Zbl 1345.94044Blazy, Olivier; Kiltz, Eike; Pan, Jiaxin 44 2014 Simple chosen-ciphertext security from low-noise LPN. Zbl 1335.94059Kiltz, Eike; Masny, Daniel; Pietrzak, Krzysztof 11 2014 An algebraic framework for Diffie-Hellman assumptions. Zbl 1316.94070Escala, Alex; Herold, Gottfried; Kiltz, Eike; Ràfols, Carla; Villar, Jorge 85 2013 More constructions of lossy and correlation-secure trapdoor functions. Zbl 1291.94083Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil 12 2013 Non-interactive key exchange. Zbl 1314.94069Freire, Eduarda S. V.; Hofheinz, Dennis; Kiltz, Eike; Paterson, Kenneth G. 9 2013 Digital signatures with minimal overhead from indifferentiable random invertible functions. Zbl 1310.94156Kiltz, Eike; Pietrzak, Krzysztof; Szegedy, Mario 7 2013 Practical chosen ciphertext secure encryption from factoring. Zbl 1291.94097Hofheinz, Dennis; Kiltz, Eike; Shoup, Victor 6 2013 Bonsai trees, or how to delegate a lattice basis. Zbl 1277.94017Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 30 2012 Message authentication, revisited. Zbl 1297.94117Dodis, Yevgeniy; Kiltz, Eike; Pietrzak, Krzysztof; Wichs, Daniel 19 2012 Optimal security proofs for full domain hash, revisited. Zbl 1297.94118Kakvi, Saqib A.; Kiltz, Eike 15 2012 Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent 14 2012 Programmable hash functions and their applications. Zbl 1272.94036Hofheinz, Dennis; Kiltz, Eike 13 2012 Lapin: an efficient authentication protocol based on ring-LPN. Zbl 1282.94078Heyse, Stefan; Kiltz, Eike; Lyubashevsky, Vadim; Paar, Christof; Pietrzak, Krzysztof 12 2012 Certifying RSA. Zbl 1292.94087Kakvi, Saqib A.; Kiltz, Eike; May, Alexander 5 2012 Short signatures from weaker assumptions. Zbl 1227.94079Hofheinz, Dennis; Jager, Tibor; Kiltz, Eike 15 2011 Efficient authentication from hard learning problems. Zbl 1281.94083Kiltz, Eike; Pietrzak, Krzysztof; Cash, David; Jain, Abhishek; Venturi, Daniele 13 2011 Bonsai trees, or how to delegate a lattice basis. Zbl 1280.94043Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris 102 2010 Leakage-resilient signatures. Zbl 1274.94135Faust, Sebastian; Kiltz, Eike; Pietrzak, Krzysztof; Rothblum, Guy N. 24 2010 Encryption schemes secure against chosen-ciphertext selective opening attacks. Zbl 1280.94052Fehr, Serge; Hofheinz, Dennis; Kiltz, Eike; Wee, Hoeteck 20 2010 More constructions of lossy and correlation-secure trapdoor functions. Zbl 1281.94024Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil 17 2010 Instantiability of RSA-OAEP under chosen-plaintext attack. Zbl 1280.94077Kiltz, Eike; O’Neill, Adam; Smith, Adam 16 2010 Adaptive trapdoor functions and chosen-ciphertext security. Zbl 1280.94076Kiltz, Eike; Mohassel, Payman; O’Neill, Adam 15 2010 Leakage resilient ElGamal encryption. Zbl 1290.94103Kiltz, Eike; Pietrzak, Krzysztof 13 2010 Some (in)sufficient conditions for secure hybrid encryption. Zbl 1205.68148Herranz, Javier; Hofheinz, Dennis; Kiltz, Eike 9 2010 Simple and efficient public-key encryption from computational Diffie-Hellman in the standard model. Zbl 1271.94020Haralambiev, Kristiyan; Jager, Tibor; Kiltz, Eike; Shoup, Victor 9 2010 Efficient hybrid encryption from ID-based encryption. Zbl 1197.94171Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike 8 2010 A twist on the Naor-Yung paradigm and its application to efficient CCA-secure encryption from hard search problems. Zbl 1274.94057Cramer, Ronald; Hofheinz, Dennis; Kiltz, Eike 4 2010 A new randomness extraction paradigm for hybrid encryption. Zbl 1239.94055Kiltz, Eike; Pietrzak, Krzysztof; Stam, Martijn; Yung, Moti 27 2009 The group of signed quadratic residues and applications. Zbl 1252.94073Hofheinz, Dennis; Kiltz, Eike 18 2009 Practical chosen ciphertext secure encryption from factoring. Zbl 1239.94052Hofheinz, Dennis; Kiltz, Eike 16 2009 The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure. Zbl 1200.94042Choi, Seung Geol; Herranz, Javier; Hofheinz, Dennis; Hwang, Jung Yeon; Kiltz, Eike; Lee, Dong Hoon; Yung, Moti 10 2009 Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Zbl 1194.68111Kiltz, Eike; Galindo, David 8 2009 On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. Zbl 1239.94054Kiltz, Eike; Pietrzak, Krzysztof 5 2009 The twin Diffie-Hellman problem and applications. Zbl 1220.94034Cash, David; Kiltz, Eike; Shoup, Victor 4 2009 Identity-based signatures. Zbl 1159.68443Kiltz, Eike; Neven, Gregory 3 2009 Compact CCA-secure encryption for messages of arbitrary length. Zbl 1227.94020Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki 1 2009 The twin Diffie-Hellman problem and applications. Zbl 1149.94307Cash, David; Kiltz, Eike; Shoup, Victor 39 2008 Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1161.94378Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia 28 2008 Programmable hash functions and their applications. Zbl 1183.94052Hofheinz, Dennis; Kiltz, Eike 25 2008 CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption. Zbl 1153.94400Kiltz, Eike; Vahlis, Yevgeniy 16 2008 Public-key encryption with non-interactive opening. Zbl 1161.94393Damgård, Ivan; Hofheinz, Dennis; Kiltz, Eike; Thorbek, Rune 9 2008 Chosen ciphertext security with optimal ciphertext overhead. Zbl 1206.94047Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki 5 2008 Secure hybrid encryption from weakened key encapsulation. Zbl 1215.94051Hofheinz, Dennis; Kiltz, Eike 56 2007 Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman. Zbl 1127.94016Kiltz, Eike 21 2007 Bounded CCA2-secure encryption. Zbl 1153.94363Cramer, Ronald; Hanaoka, Goichiro; Hofheinz, Dennis; Imai, Hideki; Kiltz, Eike; Pass, Rafael; Shelat, Abhi; Vaikuntanathan, Vinod 16 2007 Secure linear algebra using linearly recurrent sequences. Zbl 1129.94028Kiltz, Eike; Mohassel, Payman; Weinreb, Enav; Franklin, Matthew 6 2007 A note on secure computation of the Moore-Penrose pseudoinverse and its application to secure linear algebra. Zbl 1215.68034Cramer, Ronald; Kiltz, Eike; Padró, Carles 4 2007 Chosen-ciphertext security from tag-based encryption. Zbl 1113.94008Kiltz, Eike 52 2006 Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. Zbl 1112.94026Damgård, Ivan; Fitzi, Matthias; Kiltz, Eike; Nielsen, Jesper Buus; Toft, Tomas 26 2006 On the generic construction of identity-based signatures with additional properties. Zbl 1172.94575Galindo, David; Herranz, Javier; Kiltz, Eike 14 2006 Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. Zbl 1176.94046Kiltz, Eike; Galindo, David 13 2006 Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem. Zbl 1092.94024Kiltz, Eike; Winterhof, Arne 8 2006 On the limitations of the spread of an IBE-to-PKE transformation. Zbl 1151.94526Kiltz, Eike 4 2006 Chosen-ciphertext secure threshold identity-based key encapsulation without random oracles. Zbl 1152.94419Galindo, David; Kiltz, Eike 4 2006 Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Zbl 1145.94430Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia 40 2005 Append-only signatures. Zbl 1082.94541Kiltz, Eike; Mityagin, Anton; Panjwani, Saurabh; Raghavan, Barath 4 2005 Secure computation of the mean and related statistics. Zbl 1079.94556Kiltz, Eike; Leander, Gregor; Malone-Lee, John 2 2005 On the interpolation of bivariate polynomials related to the Diffie-Hellman mapping. Zbl 1070.11055Kiltz, Eike; Winterhof, Arne 6 2004 A general construction of IND-CCA2 secure public key encryption. Zbl 1123.94350Kiltz, Eike; Malone-Lee, John 3 2003 On the representation of Boolean predicates of the Diffie-Hellman function. Zbl 1039.94541Kiltz, Eike 2 2003 Complexity theoretic lower bounds on cryptographic functions. Zbl 1189.68066Kiltz, Eike 1 2003 Complexity theoretic aspects of some cryptographic functions. Zbl 1276.94018Kiltz, Eike; Simon, Hans Ulrich 1 2003 A tool box of cryptographic functions realted to the Diffie-Hellman function. Zbl 1011.94542Kiltz, Eike 5 2001 A primitive for proving the security of every bit and about universal hash functions & hard core bits. Zbl 0999.94520Kiltz, Eike 3 2001 all cited Publications top 5 cited Publications all top 5 Cited by 1,198 Authors 31 Kiltz, Eike 24 Susilo, Willy 23 Libert, Benoît 22 Hanaoka, Goichiro 21 Hofheinz, Dennis 19 Jager, Tibor 17 Wang, Huaxiong 15 Liu, Shengli 15 Wee, Hoeteck 14 Abdalla, Michel 14 Benhamouda, Fabrice 14 Ling, San 13 Venturi, Daniele 13 Yamada, Shota 12 Bellare, Mihir 12 Emura, Keita 12 Matsuda, Takahiro 12 Pan, Jiaxin 12 Tanaka, Keisuke 11 Chen, Jie 11 Chen, Yu 11 Mu, Yi 11 Nguyen, Khoa 11 Ràfols, Carla 11 Yung, Moti 10 Blazy, Olivier 10 Gu, Dawu 10 Guo, Fuchun 10 Katsumata, Shuichi 10 Lipmaa, Helger 10 Waters, Brent 10 Zhang, Jiang 9 Fiore, Dario 9 Gong, Junqing 9 Pietrzak, Krzysztof 9 Slamanig, Daniel 9 Tessaro, Stefano 8 Abe, Masayuki 8 Chen, Kefei 8 Faonio, Antonio 8 Han, Shuai 8 Huang, Zhengan 8 Li, Bao 8 Lu, Xianhui 8 Park, Jonghwan 8 Paterson, Kenneth G. 8 Pointcheval, David 8 Qin, Baodong 8 Segev, Gil 8 Stehlé, Damien 8 Watanabe, Yodai 7 Boyen, Xavier 7 Cao, Zhenfu 7 Cash, David M. 7 Herranz, Javier 7 Kunihiro, Noboru 7 Lee, Kwangsu 7 Nishimaki, Ryo 7 Steinfeld, Ron 7 Vaudenay, Serge 7 Wichs, Daniel 7 Yamakawa, Takashi 7 Zhang, Zhenfeng 6 Catalano, Dario 6 Dodis, Yevgeniy 6 Fuchsbauer, Georg 6 Galindo, David 6 Hu, Yupu 6 Huang, Qiong 6 Joye, Marc 6 Kurosawa, Kaoru 6 Lai, Junzuo 6 Neven, Gregory 6 Nielsen, Jesper Buus 6 O’Neill, Adam 6 Prest, Thomas 6 Seo, Jae Hong 6 Takayasu, Atsushi 6 Vergnaud, Damien 6 Weng, Jian 6 Xagawa, Keita 6 Yang, Bo 6 Yang, Guomin 6 Zhandry, Mark 5 Attrapadung, Nuttapong 5 Au, Man Ho 5 Boneh, Dan 5 Brakerski, Zvika 5 Chevalier, Céline 5 Chow, Sherman S. M. 5 Couteau, Geoffroy 5 Derler, David 5 Desmedt, Yvo G. 5 Duong, Dung Hoang 5 Faust, Sebastian 5 Fujisaki, Eiichiro 5 Gay, Romain 5 Hajiabadi, Mohammad 5 Jia, Dingding 5 Katz, Jonathan N. ...and 1,098 more Authors all top 5 Cited in 43 Serials 77 Journal of Cryptology 59 Designs, Codes and Cryptography 57 Theoretical Computer Science 29 Information Sciences 14 Journal of Mathematical Cryptology 12 Information Processing Letters 7 Soft Computing 7 Science China. Information Sciences 5 International Journal of Foundations of Computer Science 4 Applicable Algebra in Engineering, Communication and Computing 3 Journal of Computer and System Sciences 3 Algorithmica 3 Mathematical Problems in Engineering 3 Advances in Mathematics of Communications 3 Frontiers of Computer Science 2 SIAM Journal on Computing 2 Information and Computation 2 International Journal of Computer Mathematics 2 Finite Fields and their Applications 2 Informatica (Vilnius) 2 Journal of Applied Mathematics 2 Science in China. Series F 2 Cryptography and Communications 2 Matematicheskie Voprosy Kriptografii 1 Discrete Applied Mathematics 1 Electronics Letters 1 Mathematics of Computation 1 Applied Mathematics and Computation 1 Applied Mathematics Letters 1 Theory of Computing Systems 1 Chicago Journal of Theoretical Computer Science 1 Wuhan University Journal of Natural Sciences (WUJNS) 1 Journal of Discrete Mathematical Sciences & Cryptography 1 Interdisciplinary Information Sciences (IIS) 1 LMS Journal of Computation and Mathematics 1 International Journal of Applied Mathematics and Computer Science 1 Fundamenta Informaticae 1 Journal of Shanghai Jiaotong University (Science) 1 Discrete Mathematics, Algorithms and Applications 1 Science China. Mathematics 1 Arabian Journal for Science and Engineering 1 Journal of Mathematical Extension 1 Journal of Applied Mathematics and Computational Mechanics all top 5 Cited in 14 Fields 761 Information and communication theory, circuits (94-XX) 205 Computer science (68-XX) 48 Quantum theory (81-XX) 36 Number theory (11-XX) 21 Algebraic geometry (14-XX) 5 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 3 Combinatorics (05-XX) 2 Group theory and generalizations (20-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Associative rings and algebras (16-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Probability theory and stochastic processes (60-XX) 1 Statistics (62-XX) 1 Numerical analysis (65-XX) Citations by Year Wikidata Timeline The data are displayed as stored in Wikidata under a Creative Commons CC0 License. Updates and corrections should be made in Wikidata.