Multi-party virtual state channels S Dziembowski, L Eckey, S Faust, J Hesse, K Hostáková Annual International Conference on the Theory and Applications of …, 2019 | 49 | 2019 |
Polynomial spaces: A new framework for composite-to-prime-order transformations G Herold, J Hesse, D Hofheinz, C Rafols, A Rupp Annual Cryptology Conference, 261-279, 2014 | 39 | 2014 |
Fuzzy password-authenticated key exchange PA Dupont, J Hesse, D Pointcheval, L Reyzin, S Yakoubov Annual International Conference on the Theory and Applications of …, 2018 | 23 | 2018 |
Graded encoding schemes from obfuscation P Farshim, J Hesse, D Hofheinz, E Larraia IACR International Workshop on Public Key Cryptography, 371-400, 2018 | 18 | 2018 |
On tightly secure non-interactive key exchange J Hesse, D Hofheinz, L Kohl Annual International Cryptology Conference, 65-94, 2018 | 17 | 2018 |
Universally composable non-interactive key exchange ESV Freire, J Hesse, D Hofheinz International Conference on Security and Cryptography for Networks, 1-20, 2014 | 17 | 2014 |
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020 | 16 | 2020 |
Universal composition with global subroutines: Capturing global setup within plain UC C Badertscher, R Canetti, J Hesse, B Tackmann, V Zikas Theory of Cryptography Conference, 1-30, 2020 | 13 | 2020 |
Security analysis of CPace M Abdalla, B Haase, J Hesse International Conference on the Theory and Application of Cryptology and …, 2021 | 5 | 2021 |
FastZIP: faster and more secure zero-interaction pairing M Fomichev, J Hesse, L Almon, T Lippert, J Han, M Hollick Proceedings of the 19th Annual International Conference on Mobile Systems …, 2021 | 5 | 2021 |
Separating Standard and Asymmetric Password-Authenticated Key Exchange. J Hesse IACR Cryptol. ePrint Arch. 2019, 1064, 2019 | 4 | 2019 |
Reconfigurable Cryptography: A flexible approach to long-term security J Hesse, D Hofheinz, A Rupp Theory of Cryptography Conference, 416-445, 2016 | 4 | 2016 |
Fuzzy asymmetric password-authenticated key exchange A Erwig, J Hesse, M Orlt, S Riahi International Conference on the Theory and Application of Cryptology and …, 2020 | 3 | 2020 |
Separating symmetric and asymmetric password-authenticated key exchange J Hesse International Conference on Security and Cryptography for Networks, 579-599, 2020 | 3 | 2020 |
DPaSE: Distributed Password-Authenticated Symmetric Encryption P Das, J Hesse, A Lehmann Cryptology ePrint Archive, 2020 | 2 | 2020 |
SoK: Oblivious Pseudorandom Functions S Casacuberta, J Hesse, A Lehmann Cryptology ePrint Archive, 2022 | 1 | 2022 |
Towards tight adaptive security of non-interactive key exchange J Hesse, D Hofheinz, L Kohl, R Langrehr Theory of Cryptography Conference, 286-316, 2021 | 1 | 2021 |
On the (IR) replaceability of global setups, or how (not) to use a global ledger C Badertscher, J Hesse, V Zikas Theory of Cryptography Conference, 626-657, 2021 | 1 | 2021 |
Fuzzy authenticated key exchange PA Dupont, J Hesse, D Pointcheval, L Reyzin, S Yakoubov IACR Cryptology ePrint Archive, 2017 | 1 | 2017 |
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password P Das, J Hesse, A Lehmann Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | | 2022 |