default search action
Christian Schaffner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c30]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM. CRYPTO (2) 2022: 729-757 - [c29]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Online-Extractability in the Quantum Random-Oracle Model. EUROCRYPT (3) 2022: 677-706 - [c28]Ashwin Venkatraman, Gabriela Hug, Christian Schaffner, Marina González Vayá:
Optimal Design of Time-of-Use Tariffs using Bilevel Optimization. ISGT-Europe 2022: 1-5 - [i49]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM. CoRR abs/2202.13730 (2022) - [i48]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM. IACR Cryptol. ePrint Arch. 2022: 270 (2022) - 2021
- [c27]Gorjan Alagic, Zvika Brakerski, Yfke Dulek, Christian Schaffner:
Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits. CRYPTO (1) 2021: 497-525 - [i47]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Online-Extractability in the Quantum Random-Oracle Model. CoRR abs/2103.03085 (2021) - [i46]Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi:
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding. CoRR abs/2103.14510 (2021) - [i45]Yfke Dulek, Stacey Jeffery, Christian Majenz, Christian Schaffner, Florian Speelman, Ronald de Wolf:
A Guide for New Program Committee Members at Theoretical Computer Science Conferences. CoRR abs/2105.02773 (2021) - [i44]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Online-Extractability in the Quantum Random-Oracle Model. IACR Cryptol. ePrint Arch. 2021: 280 (2021) - [i43]Christian Majenz, Christian Schaffner, Mehrdad Tahmasbi:
Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding. IACR Cryptol. ePrint Arch. 2021: 408 (2021) - 2020
- [c26]Yfke Dulek, Alex B. Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner:
Secure Multi-party Quantum Computation with a Dishonest Majority. EUROCRYPT (3) 2020: 729-758 - [c25]Esteban Landerreche, Marc Stevens, Christian Schaffner:
Non-interactive Cryptographic Timestamping Based on Verifiable Delay Functions. Financial Cryptography 2020: 541-558 - [i42]Gorjan Alagic, Zvika Brakerski, Yfke Dulek, Christian Schaffner:
Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits. CoRR abs/2005.06432 (2020)
2010 – 2019
- 2019
- [c24]Jan Czajkowski, Andreas Hülsing, Christian Schaffner:
Quantum Indistinguishability of Random Sponges. CRYPTO (2) 2019: 296-325 - [c23]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model. CRYPTO (2) 2019: 356-383 - [i41]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model. CoRR abs/1902.07556 (2019) - [i40]Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur:
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability. CoRR abs/1904.11477 (2019) - [i39]Christian Majenz, Christian Schaffner, Jeroen van Wier:
Non-malleability for quantum public-key encryption. CoRR abs/1905.05490 (2019) - [i38]Yfke Dulek, Alex B. Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner:
Secure Multi-party Quantum Computation with a Dishonest Majority. CoRR abs/1909.13770 (2019) - [i37]Jan Czajkowski, Andreas Hülsing, Christian Schaffner:
Quantum Indistinguishability of Random Sponges. IACR Cryptol. ePrint Arch. 2019: 69 (2019) - [i36]Jelle Don, Serge Fehr, Christian Majenz, Christian Schaffner:
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model. IACR Cryptol. ePrint Arch. 2019: 190 (2019) - [i35]Esteban Landerreche, Marc Stevens, Christian Schaffner:
Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2019: 197 (2019) - [i34]Jan Czajkowski, Christian Majenz, Christian Schaffner, Sebastian Zur:
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability. IACR Cryptol. ePrint Arch. 2019: 428 (2019) - [i33]Christian Majenz, Christian Schaffner, Jeroen van Wier:
Non-malleability for quantum public-key encryption. IACR Cryptol. ePrint Arch. 2019: 496 (2019) - [i32]Yfke Dulek, Alex B. Grilo, Stacey Jeffery, Christian Majenz, Christian Schaffner:
Secure Multi-party Quantum Computation with a Dishonest Majority. IACR Cryptol. ePrint Arch. 2019: 1205 (2019) - 2018
- [j10]Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum Homomorphic Encryption for Polynomial-Size Circuits. Theory Comput. 14(1): 1-45 (2018) - [c22]Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. EUROCRYPT (3) 2018: 552-586 - [c21]Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh:
Post-quantum Security of the Sponge Construction. PQCrypto 2018: 185-204 - 2017
- [j9]Thomas Santoli, Christian Schaffner:
Using Simon's algorithm to attack symmetric-key cryptographic primitives. Quantum Inf. Comput. 17(1&2): 65-78 (2017) - [c20]Gorjan Alagic, Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum Fully Homomorphic Encryption with Verification. ASIACRYPT (1) 2017: 438-467 - [i31]Gorjan Alagic, Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum Fully Homomorphic Encryption With Verification. CoRR abs/1708.09156 (2017) - [i30]Jan Czajkowski, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, Dominique Unruh:
Post-quantum security of the sponge construction. IACR Cryptol. ePrint Arch. 2017: 771 (2017) - [i29]Eike Kiltz, Vadim Lyubashevsky, Christian Schaffner:
A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model. IACR Cryptol. ePrint Arch. 2017: 916 (2017) - 2016
- [j8]Anne Broadbent, Christian Schaffner:
Quantum cryptography beyond quantum key distribution. Des. Codes Cryptogr. 78(1): 351-382 (2016) - [c19]Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum Homomorphic Encryption for Polynomial-Sized Circuits. CRYPTO (3) 2016: 3-32 - [c18]Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. CRYPTO (3) 2016: 60-89 - [c17]Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules:
Computational Security of Quantum Encryption. ICITS 2016: 47-71 - [i28]Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules:
Computational Security of Quantum Encryption. CoRR abs/1602.01441 (2016) - [i27]Thomas Santoli, Christian Schaffner:
Using Simon's Algorithm to Attack Symmetric-Key Cryptographic Primitives. CoRR abs/1603.07856 (2016) - [i26]Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum homomorphic encryption for polynomial-sized circuits. CoRR abs/1603.09717 (2016) - [i25]Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules:
Computational Security of Quantum Encryption. IACR Cryptol. ePrint Arch. 2016: 424 (2016) - [i24]Yfke Dulek, Christian Schaffner, Florian Speelman:
Quantum homomorphic encryption for polynomial-sized circuits. IACR Cryptol. ePrint Arch. 2016: 559 (2016) - 2015
- [j7]Teresa Piovesan, Giannicola Scarpa, Christian Schaffner:
Multiparty Zero-Error Classical Channel Coding With Entanglement. IEEE Trans. Inf. Theory 61(2): 1113-1123 (2015) - [i23]Louis Salvail, Christian Schaffner, Miroslava Sotáková:
Quantifying the Leakage of Quantum Protocols for Classical Two-Party Cryptography. CoRR abs/1501.01549 (2015) - [i22]Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. CoRR abs/1504.05255 (2015) - [i21]Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:
Semantic Security and Indistinguishability in the Quantum World. IACR Cryptol. ePrint Arch. 2015: 355 (2015) - [i20]Anne Broadbent, Christian Schaffner:
Quantum Cryptography Beyond Quantum Key Distribution. IACR Cryptol. ePrint Arch. 2015: 1242 (2015) - 2014
- [j6]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. SIAM J. Comput. 43(1): 150-178 (2014) - [j5]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Secure identification and QKD in the bounded-quantum-storage model. Theor. Comput. Sci. 560: 12-26 (2014) - [c16]Harry Buhrman, Serge Fehr, Christian Schaffner:
On the Parallel Repetition of Multi-Player Games: The No-Signaling Case. TQC 2014: 24-35 - 2013
- [c15]Harry Buhrman, Serge Fehr, Christian Schaffner, Florian Speelman:
The garden-hose model. ITCS 2013: 145-158 - 2012
- [c14]Niek J. Bouman, Serge Fehr, Carlos González-Guillén, Christian Schaffner:
An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification. TQC 2012: 29-44 - [i19]Harry Buhrman, Matthias Christandl, Christian Schaffner:
Complete Insecurity of Quantum Protocols for Classical Two-Party Computation. CoRR abs/1201.0849 (2012) - 2011
- [j4]Marco Tomamichel, Christian Schaffner, Adam D. Smith, Renato Renner:
Leftover Hashing Against Quantum Side Information. IEEE Trans. Inf. Theory 57(8): 5524-5535 (2011) - [c13]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry:
Random Oracles in a Quantum World. ASIACRYPT 2011: 41-69 - [c12]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. CRYPTO 2011: 429-446 - [i18]Harry Buhrman, Serge Fehr, Christian Schaffner, Florian Speelman:
The Garden-Hose Game: A New Model of Computation, and Application to Position-Based Quantum Cryptography. CoRR abs/1109.2563 (2011) - [i17]Serge Fehr, Ran Gelles, Christian Schaffner:
Security and Composability of Randomness Expansion from Bell Inequalities. CoRR abs/1111.6052 (2011) - [i16]Harry Buhrman, Serge Fehr, Christian Schaffner:
Position-Based Quantum Cryptography. ERCIM News 2011(85): 16-17 (2011) - 2010
- [c11]Marco Tomamichel, Renato Renner, Christian Schaffner, Adam D. Smith:
Leftover Hashing against quantum side information. ISIT 2010: 2703-2707 - [i15]Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner:
Random Oracles in a Quantum World. CoRR abs/1008.0931 (2010) - [i14]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. CoRR abs/1009.2490 (2010) - [i13]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. IACR Cryptol. ePrint Arch. 2010: 275 (2010) - [i12]Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry:
Random Oracles in a Quantum World. IACR Cryptol. ePrint Arch. 2010: 428 (2010)
2000 – 2009
- 2009
- [j3]Christian Schaffner, Barbara M. Terhal, Stephanie Wehner:
Robust cryptography in the noisy-quantum-storage model. Quantum Inf. Comput. 9(11&12): 963-996 (2009) - [j2]Robert König, Renato Renner, Christian Schaffner:
The operational meaning of min- and max-entropy. IEEE Trans. Inf. Theory 55(9): 4337-4347 (2009) - [c10]Louis Salvail, Christian Schaffner, Miroslava Sotáková:
On the Power of Two-Party Quantum Cryptography. ASIACRYPT 2009: 70-87 - [c9]Ivan Damgård, Serge Fehr, Carolin Lunemann, Louis Salvail, Christian Schaffner:
Improving the Security of Quantum Protocols via Commit-and-Open. CRYPTO 2009: 408-427 - [c8]Serge Fehr, Christian Schaffner:
Composing Quantum Protocols in a Classical Environment. TCC 2009: 350-367 - 2008
- [j1]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Cryptography in the Bounded-Quantum-Storage Model. SIAM J. Comput. 37(6): 1865-1890 (2008) - [c7]Serge Fehr, Christian Schaffner:
Randomness Extraction Via delta -Biased Masking in the Presence of a Quantum Attacker. TCC 2008: 465-481 - 2007
- [c6]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Secure Identification and QKD in the Bounded-Quantum-Storage Model. CRYPTO 2007: 342-359 - [c5]Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner:
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications. CRYPTO 2007: 360-378 - [i11]Serge Fehr, Christian Schaffner:
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker. CoRR abs/0706.2606 (2007) - [i10]Christian Schaffner:
Cryptography in the Bounded-Quantum-Storage Model. CoRR abs/0709.0289 (2007) - [i9]Stephanie Wehner, Christian Schaffner, Barbara M. Terhal:
Cryptography from Noisy Photonic Storage. CoRR abs/0711.2895 (2007) - [i8]Serge Fehr, Christian Schaffner:
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker. IACR Cryptol. ePrint Arch. 2007: 249 (2007) - [i7]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Secure Identification and QKD in the Bounded-Quantum-Storage Model. IACR Cryptol. ePrint Arch. 2007: 327 (2007) - [i6]Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner:
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications. IACR Cryptol. ePrint Arch. 2007: 328 (2007) - 2006
- [c4]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Oblivious Transfer and Linear Functions. CRYPTO 2006: 427-444 - [c3]Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger:
Information-Theoretic Conditions for Two-Party Secure Function Evaluation. EUROCRYPT 2006: 538-554 - [i5]Ivan Damgård, Serge Fehr, Renato Renner, Louis Salvail, Christian Schaffner:
A Tight High-Order Entropic Quantum Uncertainty Relation With Applications. CoRR abs/quant-ph/0612014 (2006) - [i4]Claude Crépeau, George Savvides, Christian Schaffner, Jürg Wullschleger:
Information-Theoretic Conditions for Two-Party Secure Function Evaluation. IACR Cryptol. ePrint Arch. 2006: 183 (2006) - 2005
- [c2]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Cryptography In the Bounded Quantum-Storage Model. FOCS 2005: 449-458 - [c1]Ivan Bjerre Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Cryptography in the bounded quantum-storage model. ICITS 2005: 24-27 - [i3]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Cryptography In the Bounded Quantum-Storage Model. CoRR abs/quant-ph/0508222 (2005) - [i2]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Cryptography In the Bounded Quantum-Storage Model. IACR Cryptol. ePrint Arch. 2005: 291 (2005) - [i1]Ivan Damgård, Serge Fehr, Louis Salvail, Christian Schaffner:
Oblivious Transfer and Linear Functions. IACR Cryptol. ePrint Arch. 2005: 349 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint