Cryptographers' World
 

Eike Kiltz


Author's Web Page Link

23 papers in database with 748 citations StarStar

H-number: 15

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, Journal of Cryptology, Volume 21(3), pp. 350 - 391, Springer, 2008.

[Cited 83 times Red Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Dennis Hofheinz,  Eike Kiltz,  The Group of Signed Quadratic Residues and Applications, pp. 637 - 653, CRYPTO 2009.

[Electronic Edition][Cited 17 times ]

2. Eike Kiltz,  Krzysztof Pietrzak,  On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model, pp. 389 - 406, EUROCRYPT 2009.

[Electronic Edition][Cited 9 times ]

3. Eike Kiltz,  Krzysztof Pietrzak,  Martijn Stam,  Moti Yung,  A New Randomness Extraction Paradigm for Hybrid Encryption, pp. 590 - 609, EUROCRYPT 2009.

[Electronic Edition][Cited 19 times ]

4. Dennis Hofheinz,  Eike Kiltz,  Practical Chosen Ciphertext Secure Encryption from Factoring, pp. 313 - 332, EUROCRYPT 2009.

[Electronic Edition][Cited 24 times ]

5. Masayuki Abe,  Eike Kiltz,  Tatsuaki Okamoto,  Compact CCA-Secure Encryption for Messages of Arbitrary Length, pp. 377 - 392, PKC 2009.

[Electronic Edition][Cited 8 times ]

6. Masayuki Abe,  Eike Kiltz,  Tatsuaki Okamoto,  Chosen Ciphertext Security with Optimal Ciphertext Overhead, pp. 355 - 371, ASIACRYPT 2008.

[Electronic Edition][Cited 8 times ]

7. Dennis Hofheinz,  Eike Kiltz,  Programmable Hash Functions and Their Applications, pp. 21 - 38, CRYPTO 2008.

[Electronic Edition][Cited 18 times ]

8. Ivan Damgard,  Dennis Hofheinz,  Eike Kiltz,  Rune Thorbek,  Public-Key Encryption with Non-interactive Opening, pp. 239 - 255, CT-RSA 2008.

[Electronic Edition][Cited 6 times ]

9. Eike Kiltz,  Yevgeniy Vahlis,  CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, pp. 221 - 238, CT-RSA 2008.

[Electronic Edition][Cited 25 times ]

10. David Cash,  Eike Kiltz,  Victor Shoup,  The Twin Diffie-Hellman Problem and Applications, pp. 127 - 145, EUROCRYPT 2008.

[Electronic Edition][Cited 56 times Red Star]

11. Eike Kiltz,  Payman Mohassel,  Enav Weinreb,  Matthew K. Franklin,  Secure Linear Algebra Using Linearly Recurrent Sequences, pp. 291 - 310, TCC 2007.

[Electronic Edition][Cited 12 times ]

12. Ronald Cramer,  Eike Kiltz,  Carles Padró,  A Note on Secure Computation of the Moore-Penrose Pseudoinverse and Its Application to Secure Linear Algebra, pp. 613 - 630, CRYPTO 2007.

[Electronic Edition][Cited 10 times ]

13. Dennis Hofheinz,  Eike Kiltz,  Secure Hybrid Encryption from Weakened Key Encapsulation, pp. 553 - 571, CRYPTO 2007.

[Electronic Edition][Cited 58 times Red Star]

14. Eike Kiltz,  Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman, pp. 282 - 297, PKC 2007.

[Electronic Edition][Cited 53 times Red Star]

15. Ronald Cramer,  Goichiro Hanaoka,  Dennis Hofheinz,  Hideki Imai,  Eike Kiltz,  Rafael Pass,  Abhi Shelat,  Vinod Vaikuntanathan,  Bounded CCA2-Secure Encryption, pp. 502 - 518, ASIACRYPT 2007.

[Electronic Edition][Cited 16 times ]

16. Eike Kiltz,  On the Limitations of the Spread of an IBE-to-PKE Transformation, pp. 274 - 289, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 12 times ]

17. Eike Kiltz,  Chosen-Ciphertext Security from Tag-Based Encryption, pp. 581 - 600, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 64 times Red Star]

18. Ivan Damgard,  Matthias Fitzi,  Eike Kiltz,  Jesper Buus Nielsen,  Tomas Toft,  Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation, pp. 285 - 304, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 85 times Red Star]

19. David Galindo,  Javier Herranz,  Eike Kiltz,  On the Generic Construction of Identity-Based Signatures with Additional Properties, pp. 178 - 193, ASIACRYPT 2006.

[Electronic Edition][Cited 45 times ]

20. Michel Abdalla,  Mihir Bellare,  Dario Catalano,  Eike Kiltz,  Tadayoshi Kohno,  Tanja Lange,  John Malone-Lee,  Gregory Neven,  Pascal Paillier,  Haixia Shi,  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions, pp. 205 - 222, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 154 times Red StarRed Star]

21. Eike Kiltz,  Gregor Leander,  John Malone-Lee,  Secure Computation of the Mean and Related Statistics, pp. 283 - 302, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 34 times ]

22. Eike Kiltz,  A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function, pp. 339 - 350, INDOCRYPT 2001.

[Electronic Edition][Cited 15 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...