Suivre
Christian Matt
Christian Matt
Primev
Adresse e-mail validée de primev.xyz - Page d'accueil
Titre
Citée par
Citée par
Année
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory 63 (5), 3277-3305, 2017
812017
Indistinguishability obfuscation without multilinear maps: New paradigms via low degree weak pseudorandomness and security amplification
P Ananth, A Jain, H Lin, C Matt, A Sahai
Annual International Cryptology Conference, 284-332, 2019
682019
How to leverage hardness of constant-degree expanding polynomials over to build
A Jain, H Lin, C Matt, A Sahai
Annual International Conference on the Theory and Applications of …, 2019
59*2019
Afgjort: A partially synchronous finality layer for blockchains
T Dinsdale-Young, B Magri, C Matt, JB Nielsen, D Tschudi
International Conference on Security and Cryptography for Networks, 24-44, 2020
48*2020
Augmented secure channels and the goal of the TLS 1.3 record layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
422015
The one-time pad revisited
C Matt, U Maurer
2013 IEEE International Symposium on Information Theory, 2706-2710, 2013
412013
Pseudo flawed-smudging generators and their application to indistinguishability obfuscation
H Lin, C Matt
IACR Cryptology ePrint Archive 2018, 646, 2018
332018
GearBox: Optimal-size shard committees by leveraging the safety-liveness dichotomy
B David, B Magri, C Matt, JB Nielsen, D Tschudi
2022 ACM SIGSAC Conference on Computer and Communications Security, 683-696, 2022
29*2022
Strengthening access control encryption
C Badertscher, C Matt, U Maurer
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
282017
A definitional framework for functional encryption
C Matt, U Maurer
2015 IEEE 28th Computer Security Foundations Symposium, 217-231, 2015
15*2015
Formalizing delayed adaptive corruptions and the security of flooding networks
C Matt, JB Nielsen, SE Thomsen
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
142022
Robust authenticated encryption and the limits of symmetric cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
142015
Idealizing identity-based encryption
D Hofheinz, C Matt, U Maurer
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
122015
Practical provably secure flooding for blockchains
CD Liu Zhang, C Matt, U Maurer, G Rito, S Eller Thomsen
Advances in Cryptology–ASIACRYPT 2022 13791, 774-805, 2023
82023
Toward an algebraic theory of systems
C Matt, U Maurer, C Portmann, R Renner, B Tackmann
Theoretical Computer Science 747, 1-25, 2018
72018
Asymptotically optimal message dissemination with applications to blockchains
CD Liu-Zhang, C Matt, SE Thomsen
Cryptology ePrint Archive, 2022
62022
Policy-compliant signatures
C Badertscher, C Matt, H Waldner
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
52021
Weight-based Nakamoto-style blockchains
SH Kamp, B Magri, C Matt, JB Nielsen, SE Thomsen, D Tschudi
International Conference on Cryptology and Information Security in Latin …, 2021
3*2021
A constructive treatment of enhanced encryption schemes
C Matt
ETH Zurich, 2017
2017
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–19