Search

Your search keyword '"Fehr, Serge"' showing total 328 results

Search Constraints

Start Over You searched for: Author "Fehr, Serge" Remove constraint Author: "Fehr, Serge"
328 results on '"Fehr, Serge"'

Search Results

1. On the (In)Security of the BUFF Transform

2. Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF

3. Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM

4. Online-Extractability in the Quantum Random-Oracle Model

6. On Fully-Secure Honest Majority MPC Without Round Overhead

7. On the Quantum Security of HAWK

8. Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium

9. On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work

10. The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More

12. Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model

16. Fiat-Shamir Transformation of Multi-round Interactive Proofs

17. Parallel Repetition of -Special-Sound Multi-round Interactive Proofs

18. Online-Extractability in the Quantum Random-Oracle Model

19. A New Approach to Privacy-Preserving Clinical Decision Support Systems

20. Secure certification of mixed quantum states with application to two-party randomness generation

22. Compressing Proofs of k-Out-Of-n Partial Knowledge

23. On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work

25. Sublinear Bounds on the Distinguishing Advantage for Multiple Samples

26. On the Quantum Complexity of the Continuous Hidden Subgroup Problem

27. Quantum Authentication and Encryption with Key Recycling

28. Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications

34. On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments

35. Multi-Prover Commitments Against Non-Signaling Attacks

36. Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary

37. On the Parallel Repetition of Multi-Player Games: The No-Signaling Case

38. On quantum Renyi entropies: a new generalization and some properties

39. Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions

41. A Monogamy-of-Entanglement Game With Applications to Device-Independent Quantum Cryptography

42. Security and Composability of Randomness Expansion from Bell Inequalities

43. The Garden-Hose Model

44. An All-But-One Entropic Uncertainty Relation, and Application to Password-based Identification

45. Position-Based Quantum Cryptography: Impossibility and Constructions

46. Position-Based Quantum Cryptography

47. Sampling in a Quantum Population, and Applications

48. Improving the Security of Quantum Protocols via Commit-and-Open

49. Composing Quantum Protocols in a Classical Environment

Catalog

Books, media, physical & digital resources