Mark Simkin
Mark Simkin
Verified email at cs.au.dk - Homepage
Title
Cited by
Cited by
Year
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016, 301-330, 2016
432016
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
D Aggarwal, I Damgård, JB Nielsen, M Obremski, E Purwanto, J Ribeiro, ...
Annual International Cryptology Conference, 510-539, 2019
372019
Yet another compiler for active security or: Efficient MPC over arbitrary rings
I Damgård, C Orlandi, M Simkin
Annual International Cryptology Conference, 799-829, 2018
292018
VeriStream–a framework for verifiable data streaming
D Schöder, M Simkin
International conference on financial cryptography and data security, 548-566, 2015
242015
Use your brain! arithmetic 3pc for any modulus with active security
H Eerikson, M Keller, C Orlandi, P Pullonen, J Puura, M Simkin
1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020
212020
Nearly optimal verifiable data streaming
J Krupp, D Schröder, M Simkin, D Fiore, G Ateniese, S Nürnberger
Public-Key Cryptography–PKC 2016, 417-445, 2016
182016
The communication complexity of threshold private set intersection
S Ghosh, M Simkin
Annual International Cryptology Conference, 3-29, 2019
152019
Continuously non-malleable codes with split-state refresh
A Faonio, JB Nielsen, M Simkin, D Venturi
Theoretical Computer Science 759, 98-132, 2019
152019
Lower bounds for leakage-resilient secret sharing
JB Nielsen, M Simkin
Annual International Conference on the Theory and Applications of …, 2020
132020
Compact zero-knowledge proofs of small hamming weight
I Damgård, J Luo, S Oechsner, P Scholl, M Simkin
IACR International Workshop on Public Key Cryptography, 530-560, 2018
112018
Webtrust–a comprehensive authenticity and integrity framework for HTTP
M Backes, RW Gerling, S Gerling, S Nürnberger, D Schröder, M Simkin
International Conference on Applied Cryptography and Network Security, 401-418, 2014
112014
Ubic: Bridging the gap between digital cryptography and the physical world
M Simkin, D Schröder, A Bulling, M Fritz
European Symposium on Research in Computer Security, 56-75, 2014
102014
Optimal Oblivious Priority Queues and Offline Oblivious RAM.
Z Jafargholi, KG Larsen, M Simkin
IACR Cryptol. ePrint Arch. 2019, 237, 2019
8*2019
Lower bounds for multi-server oblivious rams
KG Larsen, M Simkin, K Yeo
Theory of Cryptography Conference, 486-503, 2020
52020
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model
G Brian, A Faonio, M Obremski, M Simkin, D Venturi
Annual International Cryptology Conference, 127-155, 2020
52020
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead
M Raskin, M Simkin
International Conference on the Theory and Application of Cryptology and …, 2019
5*2019
Black-box transformations from passive to covert security with public verifiability
I Damgård, C Orlandi, M Simkin
Annual International Cryptology Conference, 647-676, 2020
42020
Functional Credentials.
D Deuber, M Maffei, G Malavolta, M Rabkin, D Schröder, M Simkin
Proc. Priv. Enhancing Technol. 2018 (2), 64-84, 2018
42018
Secret sharing lower bound: Either reconstruction is hard or shares are long
KG Larsen, M Simkin
International Conference on Security and Cryptography for Networks, 566-578, 2020
22020
Nearly Optimal Verifiable Data Streaming (Full Version).
J Krupp, D Schröder, M Simkin, D Fiore, G Ateniese, S Nürnberger
IACR Cryptol. ePrint Arch. 2015, 333, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20