Nico Döttling
Nico Döttling
Faculty at the Helmholtz Center for Information Security (CISPA)
Verified email at - Homepage
Cited by
Cited by
Identity-based encryption from the Diffie-Hellman assumption
N Döttling, S Garg
Annual International Cryptology Conference, 537-569, 2017
Lossy codes and a new variant of the learning-with-errors problem
N Döttling, J Müller-Quade
Annual International Conference on the Theory and Applications of …, 2013
IND-CCA secure cryptography based on a variant of the LPN problem
N Döttling, J Müller-Quade, ACA Nascimento
International Conference on the Theory and Application of Cryptology and …, 2012
Unconditional and composable security using a single stateful tamper-proof hardware token
N Döttling, D Kraschewski, J Müller-Quade
Theory of Cryptography Conference, 164-181, 2011
Linear secret sharing schemes from error correcting codes and universal hash functions
R Cramer, IB Damgård, N Döttling, S Fehr, G Spini
Annual International Conference on the Theory and Applications of …, 2015
Laconic oblivious transfer and its applications
C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou
Annual International Cryptology Conference, 33-65, 2017
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13
D Apon, N Döttling, S Garg, P Mukherjee
44th International Colloquium on Automata, Languages, and Programming (ICALP …, 2017
Two-message statistically sender-private OT from LWE
Z Brakerski, N Döttling
Theory of Cryptography Conference, 370-390, 2018
A CCA2 secure variant of the McEliece cryptosystem
N Dottling, R Dowsley, J Muller-Quade, ACA Nascimento
IEEE Transactions on Information Theory 58 (10), 6672-6680, 2012
New constructions of identity-based and key-dependent message secure encryption schemes
N Döttling, S Garg, M Hajiabadi, D Masny
IACR International Workshop on Public Key Cryptography, 3-31, 2018
From selective IBE to full IBE and selective HIBE
N Döttling, S Garg
Theory of Cryptography Conference, 372-408, 2017
Rate-1, linear time and additively homomorphic UC commitments
I Cascudo, I Damgård, B David, N Döttling, JB Nielsen
Annual International Cryptology Conference, 179-207, 2016
Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens
N Döttling, T Mie, J Müller-Quade, T Nilges
Theory of Cryptography Conference, 642-661, 2013
Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles
Z Brakerski, N Döttling, S Garg, G Malavolta
Theory of Cryptography Conference, 407-437, 2019
Trapdoor hash functions and their applications
N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky
Annual International Cryptology Conference, 3-32, 2019
TinyOLE: Efficient actively secure two-party computation from oblivious linear function evaluation
N Döttling, S Ghosh, JB Nielsen, T Nilges, R Trifiletti
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Vulnerabilities of wireless key exchange based on channel reciprocity
N Döttling, D Lazich, J Müller-Quade, AS de Almeida
International Workshop on Information Security Applications, 206-220, 2010
Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices.
Z Brakerski, N Döttling, S Garg, G Malavolta
IACR Cryptol. ePrint Arch. 2020, 1024, 2020
Low noise LPN: KDM secure public key encryption and sample amplification
N Döttling
IACR International Workshop on Public Key Cryptography, 604-626, 2015
Efficient pseudorandom functions via on-the-fly adaptation
N Döttling, D Schröder
Annual Cryptology Conference, 329-350, 2015
The system can't perform the operation now. Try again later.
Articles 1–20