Duman, Julien; Hövelmanns, Kathrin; Kiltz, Eike; Lyubashevsky, Vadim; Seiler, Gregor; Unruh, Dominique A thorough treatment of highly-efficient NTRU instantiations. (English) Zbl 1527.94035 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 65-94 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Duman} et al., Lect. Notes Comput. Sci. 13940, 65--94 (2023; Zbl 1527.94035) Full Text: DOI
Kakvi, Saqib A.; Kiltz, Eike Optimal security proofs for full domain hash. Revisited. (English) Zbl 1426.94106 J. Cryptology 31, No. 1, 276-306 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. A. Kakvi} and \textit{E. Kiltz}, J. Cryptology 31, No. 1, 276--306 (2018; Zbl 1426.94106) Full Text: DOI
Kiltz, Eike; Masny, Daniel; Pan, Jiaxin Optimal security proofs for signatures from identification schemes. (English) Zbl 1391.94768 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 33-61 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Kiltz} et al., Lect. Notes Comput. Sci. 9815, 33--61 (2016; Zbl 1391.94768) Full Text: DOI
Cash, David; Hofheinz, Dennis; Kiltz, Eike; Peikert, Chris Bonsai trees, or how to delegate a lattice basis. (English) Zbl 1277.94017 J. Cryptology 25, No. 4, 601-639 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Cash} et al., J. Cryptology 25, No. 4, 601--639 (2012; Zbl 1277.94017) Full Text: DOI Link
Hofheinz, Dennis; Kiltz, Eike Programmable hash functions and their applications. (English) Zbl 1272.94036 J. Cryptology 25, No. 3, 484-527 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Hofheinz} and \textit{E. Kiltz}, J. Cryptology 25, No. 3, 484--527 (2012; Zbl 1272.94036) Full Text: DOI
Abe, Masayuki; Cui, Yang; Imai, Hideki; Kiltz, Eike Efficient hybrid encryption from ID-based encryption. (English) Zbl 1197.94171 Des. Codes Cryptography 54, No. 3, 205-240 (2010). Reviewer: Zlatko Varbanov (Veliko Tarnovo) MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{M. Abe} et al., Des. Codes Cryptography 54, No. 3, 205--240 (2010; Zbl 1197.94171) Full Text: DOI
Cash, David; Kiltz, Eike; Shoup, Victor The twin Diffie-Hellman problem and applications. (English) Zbl 1220.94034 J. Cryptology 22, No. 4, 470-504 (2009). MSC: 94A60 94A62 68Q17 PDFBibTeX XMLCite \textit{D. Cash} et al., J. Cryptology 22, No. 4, 470--504 (2009; Zbl 1220.94034) Full Text: DOI
Kiltz, Eike; Galindo, David Direct chosen-ciphertext secure identity-based key encapsulation without random oracles. (English) Zbl 1194.68111 Theor. Comput. Sci. 410, No. 47-49, 5093-5111 (2009). MSC: 68P25 PDFBibTeX XMLCite \textit{E. Kiltz} and \textit{D. Galindo}, Theor. Comput. Sci. 410, No. 47--49, 5093--5111 (2009; Zbl 1194.68111) Full Text: DOI
Abdalla, Michel; Bellare, Mihir; Catalano, Dario; Kiltz, Eike; Kohno, Tadayoshi; Lange, Tanja; Malone-Lee, John; Neven, Gregory; Paillier, Pascal; Shi, Haixia Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. (English) Zbl 1161.94378 J. Cryptology 21, No. 3, 350-391 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abdalla} et al., J. Cryptology 21, No. 3, 350--391 (2008; Zbl 1161.94378) Full Text: DOI
Hofheinz, Dennis; Kiltz, Eike Programmable hash functions and their applications. (English) Zbl 1183.94052 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 21-38 (2008). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{D. Hofheinz} and \textit{E. Kiltz}, Lect. Notes Comput. Sci. 5157, 21--38 (2008; Zbl 1183.94052) Full Text: DOI
Kiltz, Eike; Vahlis, Yevgeniy CCA2 secure IBE: Standard model efficiency through authenticated symmetric encryption. (English) Zbl 1153.94400 Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 221-238 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. Kiltz} and \textit{Y. Vahlis}, Lect. Notes Comput. Sci. 4964, 221--238 (2008; Zbl 1153.94400) Full Text: DOI