Eike Kiltz
Eike Kiltz
Professor of Computer Science, Ruhr-Universität Bochum
Verified email at rub.de - Homepage
Title
Cited by
Cited by
Year
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
M Abdalla, M Bellare, D Catalano, E Kiltz, T Kohno, T Lange, ...
Annual international cryptology conference, 205-222, 2005
9812005
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Annual International Conference on the Theory and Applications of …, 2010
6382010
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
I Damgård, M Fitzi, E Kiltz, JB Nielsen, T Toft
Theory of Cryptography Conference, 285-304, 2006
4052006
Secure hybrid encryption from weakened key encapsulation
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 553-571, 2007
3092007
Chosen-ciphertext security from tag-based encryption
E Kiltz
Theory of Cryptography Conference, 581-600, 2006
2862006
CRYSTALS-Kyber: a CCA-secure module-lattice-based KEM
J Bos, L Ducas, E Kiltz, T Lepoint, V Lyubashevsky, JM Schanck, ...
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 353-367, 2018
2492018
The twin Diffie-Hellman problem and applications
D Cash, E Kiltz, V Shoup
Annual International Conference on the Theory and Applications of …, 2008
2482008
An algebraic framework for Diffie–Hellman assumptions
A Escala, G Herold, E Kiltz, C Ràfols, J Villar
Journal of cryptology 30 (1), 242-288, 2017
2452017
A modular analysis of the Fujisaki-Okamoto transformation
D Hofheinz, K Hövelmanns, E Kiltz
Theory of Cryptography Conference, 341-371, 2017
2292017
Leakage-resilient signatures
S Faust, E Kiltz, K Pietrzak, GN Rothblum
Theory of Cryptography Conference, 343-360, 2010
1672010
Bonsai trees, or how to delegate a lattice basis
D Cash, D Hofheinz, E Kiltz, C Peikert
Journal of cryptology 25 (4), 601-639, 2012
1532012
Programmable hash functions and their applications
D Hofheinz, E Kiltz
Annual International Cryptology Conference, 21-38, 2008
1412008
Chosen-ciphertext secure key-encapsulation based on gap hashed Diffie-Hellman
E Kiltz
International Workshop on Public Key Cryptography, 282-297, 2007
1372007
Practical chosen ciphertext secure encryption from factoring
D Hofheinz, E Kiltz
Annual International Conference on the Theory and Applications of …, 2009
1352009
On the generic construction of identity-based signatures with additional properties
D Galindo, J Herranz, E Kiltz
International Conference on the Theory and Application of Cryptology and …, 2006
1312006
Efficient authentication from hard learning problems
E Kiltz, K Pietrzak, D Venturi, D Cash, A Jain
Journal of Cryptology 30 (4), 1238-1275, 2017
1142017
More constructions of lossy and correlation-secure trapdoor functions
DM Freeman, O Goldreich, E Kiltz, A Rosen, G Segev
International Workshop on Public Key Cryptography, 279-295, 2010
1142010
Leakage resilient elgamal encryption
E Kiltz, K Pietrzak
International conference on the theory and application of cryptology and …, 2010
1122010
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
E Kiltz, D Galindo
Theoretical Computer Science 410 (47-49), 5093-5111, 2009
1102009
Generalized key delegation for hierarchical identity-based encryption
M Abdalla, E Kiltz, G Neven
European Symposium on Research in Computer Security, 139-154, 2007
1052007
The system can't perform the operation now. Try again later.
Articles 1–20