Dominique Schröder
Dominique Schröder
Full Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-Nürnberg
Verified email at - Homepage
Cited by
Cited by
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
Redactable signatures for tree-structured data: Definitions and constructions
C Brzuska, H Busch, O Dagdelen, M Fischlin, M Franz, S Katzenbeisser, ...
Applied Cryptography and Network Security: 8th International Conference …, 2010
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
Liar, liar, coins on fire! Penalizing equivocation by loss of bitcoins
T Ruffing, A Kate, D Schröder
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Privacy and access control for outsourced personal records
M Maffei, G Malavolta, M Reinert, D Schröder
2015 IEEE Symposium on Security and Privacy, 341-358, 2015
On the impossibility of three-move blind signature schemes
M Fischlin, D Schröder
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
Omniring: Scaling private payments without trusted setup
RWF Lai, V Ronge, T Ruffing, D Schröder, SAK Thyagarajan, J Wang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys
N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ...
Public-Key Cryptography–PKC 2016, 301-330, 2016
Security of blind signatures revisited
D Schröder, D Unruh
International Workshop on Public Key Cryptography, 662-679, 2012
On tight security proofs for Schnorr signatures
N Fleischhacker, T Jager, D Schröder
Journal of Cryptology 32 (2), 566-599, 2019
Round optimal blind signatures
S Garg, V Rao, A Sahai, D Schröder, D Unruh
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
Verifiable data streaming
D Schröder, H Schröder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
Aggregate and verifiably encrypted signatures from multilinear maps without random oracles
M Rückert, D Schröder
International Conference on Information Security and Assurance, 750-759, 2009
Delegatable functional signatures
S Meiser, D Schröder
IET Information Security 12 (3), 194-206, 2018
Verifiable timed signatures made practical
SAK Thyagarajan, A Bhat, G Malavolta, N Döttling, A Kate, D Schröder
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
Phoenix: Rebirth of a Cryptographic {Password-Hardening} Service
RWF Lai, C Egger, D Schröder, SSM Chow
26th USENIX Security Symposium (USENIX Security 17), 899-916, 2017
Security of verifiably encrypted signatures and a construction without random oracles
M Rückert, D Schröder
International Conference on Pairing-Based Cryptography, 17-34, 2009
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
Efficient sanitizable signatures without random oracles
RWF Lai, T Zhang, SSM Chow, D Schröder
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
History-free sequential aggregate signatures
M Fischlin, A Lehmann, D Schröder
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20