Cryptographers' World
 

Thomas Holenstein


Author's Web Page Link

7 papers in database with 115 citations 

H-number: 6

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Iftach Haitner,  Thomas Holenstein,  On the (Im)Possibility of Key Dependent Encryption, pp. 202 - 219, TCC 2009.

[Electronic Edition][Cited 23 times ]

2. Thomas Holenstein,  Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness, pp. 443 - 461, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

3. Thomas Holenstein,  Renato Renner,  One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption, pp. 478 - 493, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

4. Thomas Holenstein,  Key agreement from weak bit agreement, pp. 664 - 673, STOC 2005.

[Electronic Edition][Cited 31 times ]

5. Thomas Holenstein,  Ueli M. Maurer,  Johan Sjödin,  Complete Classification of Bilinear Hard-Core Functions, pp. 73 - 91, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

6. Matthias Fitzi,  Thomas Holenstein,  Jürg Wullschleger,  Multi-party Computation with Hybrid Security, pp. 419 - 438, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

7. Matthias Fitzi,  Martin Hirt,  Thomas Holenstein,  Jürg Wullschleger,  Two-Threshold Broadcast and Detectable Multi-party Computation, pp. 51 - 67, EUROCRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...