Edit Profile (opens in new tab) Döttling, Nico Compute Distance To: Compute Author ID: dottling.nico Published as: Döttling, Nico Documents Indexed: 38 Publications since 2011 Co-Authors: 50 Co-Authors with 37 Joint Publications 854 Co-Co-Authors all top 5 Co-Authors 1 single-authored 12 Garg, Sanjam 10 Müller-Quade, Jörn 7 Malavolta, Giulio 6 Brakerski, Zvika 5 Kraschewski, Daniel 4 Damgård, Ivan Bjerre 3 Hajiabadi, Mohammad 3 Nilges, Tobias 2 Branco, Pedro 2 Cascudo, Ignacio 2 Cramer, Ronald John Fitzgerald 2 David, Bernardo Machado 2 Dowsley, Rafael 2 Giacomelli, Irene 2 Gupta, Divya 2 Masny, Daniel 2 Miao, Peihan 2 Mukherjee, Pratyay 2 Nascimento, Anderson C. A. 2 Nielsen, Jesper Buus 2 Schröder, Dominique 1 Aggarwal, Divesh 1 Apon, Daniel 1 Backes, Michael 1 Broadnax, Brandon 1 Cho, Chongwon 1 Deuber, Dominic 1 Fehr, Serge 1 Fleischhacker, Nils 1 Hanzlik, Lucjan 1 Hartung, Gunnar 1 Ishai, Yuval 1 Kluczniak, Kamil 1 Krupp, Johannes 1 Lai, Russell W. F. 1 Liu, Kevin Fong-Rey 1 Magri, Bernardo 1 Mie, Thilo 1 Mour, Tamer 1 Nishimaki, Ryo 1 Obremski, Maciej 1 Ostrovsky, Rafail 1 Polychroniadou, Antigoni 1 Pu, Sihang 1 Purwanto, Erick 1 Schneider, Jonas 1 Spini, Gabriele 1 Thyagarajan, Sri Aravinda Krishnan 1 Wichs, Daniel 1 Xing, Chaoping Serials 1 IEEE Transactions on Information Theory Fields 38 Information and communication theory, circuits (94-XX) 9 Computer science (68-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 28 Publications have been cited 143 times in 105 Documents Cited by ▼ Year ▼ Identity-based encryption from the Diffie-Hellman assumption. Zbl 1385.94033Döttling, Nico; Garg, Sanjam 15 2017 Two-message statistically sender-private OT from LWE. Zbl 1430.94060Brakerski, Zvika; Döttling, Nico 10 2018 Low noise LPN: KDM secure public key encryption and sample amplification. Zbl 1345.94057Döttling, Nico 9 2015 Linear secret sharing schemes from error correcting codes and universal hash functions. Zbl 1371.94665Cramer, Ronald; Damgård, Ivan Bjerre; Döttling, Nico; Fehr, Serge; Spini, Gabriele 9 2015 IND-CCA secure cryptography based on a variant of the LPN problem. Zbl 1292.94056Döttling, Nico; Müller-Quade, Jörn; Nascimento, Anderson C. A. 8 2012 Efficient pseudorandom functions via on-the-fly adaptation. Zbl 1375.94092Döttling, Nico; Schröder, Dominique 8 2015 New constructions of identity-based and key-dependent message secure encryption schemes. Zbl 1385.94035Döttling, Nico; Garg, Sanjam; Hajiabadi, Mohammad; Masny, Daniel 8 2018 Lossy codes and a new variant of the learning-with-errors problem. Zbl 1300.94052Döttling, Nico; Müller-Quade, Jörn 7 2013 Trapdoor hash functions and their applications. Zbl 1436.94054Döttling, Nico; Garg, Sanjam; Ishai, Yuval; Malavolta, Giulio; Mour, Tamer; Ostrovsky, Rafail 7 2019 Laconic oblivious transfer and its applications. Zbl 1409.94866Cho, Chongwon; Döttling, Nico; Garg, Sanjam; Gupta, Divya; Miao, Peihan; Polychroniadou, Antigoni 6 2017 Candidate iO from homomorphic encryption schemes. Zbl 1479.94137Brakerski, Zvika; Döttling, Nico; Garg, Sanjam; Malavolta, Giulio 6 2020 Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus 5 2016 Unconditional and composable security using a single stateful Tamper-proof hardware token. Zbl 1295.94055Döttling, Nico; Kraschewski, Daniel; Müller-Quade, Jörn 5 2011 Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles. Zbl 1455.94132Brakerski, Zvika; Döttling, Nico; Garg, Sanjam; Malavolta, Giulio 5 2019 From selective IBE to full IBE and selective HIBE. Zbl 1385.94034Döttling, Nico; Garg, Sanjam 5 2017 Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens. Zbl 1315.94069Döttling, Nico; Mie, Thilo; Müller-Quade, Jörn; Nilges, Tobias 4 2013 A CCA2 secure variant of the McEliece cryptosystem. Zbl 1364.94534Döttling, Nico; Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. 4 2012 General statistically secure computation with bounded-resettable hardware tokens. Zbl 1354.94027Döttling, Nico; Kraschewski, Daniel; Müller-Quade, Jörn; Nilges, Tobias 3 2015 From stateful hardware to resettable hardware using symmetric assumptions. Zbl 1388.94051Döttling, Nico; Kraschewski, Daniel; Müller-Quade, Jörn; Nilges, Tobias 3 2015 Cryptanalysis of indistinguishability obfuscations of circuits over GGH13. Zbl 1441.94068Apon, Daniel; Döttling, Nico; Garg, Sanjam; Mukherjee, Pratyay 3 2017 Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick 3 2019 Ring signatures: logarithmic-size, no setup – from standard assumptions. Zbl 07162731Backes, Michael; Döttling, Nico; Hanzlik, Lucjan; Kluczniak, Kamil; Schneider, Jonas 3 2019 Multiparty cardinality testing for threshold private intersection. Zbl 07450200Branco, Pedro; Döttling, Nico; Pu, Sihang 2 2021 Two-message, oblivious evaluation of cryptographic functionalities. Zbl 1406.94046Döttling, Nico; Fleischhacker, Nils; Krupp, Johannes; Schröder, Dominique 1 2016 Concurrently composable security with shielded super-polynomial simulators. Zbl 1411.94051Broadnax, Brandon; Döttling, Nico; Hartung, Gunnar; Müller-Quade, Jörn; Nagel, Matthias 1 2017 Efficient UC commitment extension with homomorphism for free (and applications). Zbl 1455.94135Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Dowsley, Rafael; Giacomelli, Irene 1 2019 Linear-time non-malleable codes in the bit-wise independent tampering model. Zbl 1417.94053Cramer, Ronald; Damgård, Ivan; Döttling, Nico; Giacomelli, Irene; Xing, Chaoping 1 2017 Lossiness and entropic hardness for ring-LWE. Zbl 1479.94136Brakerski, Zvika; Döttling, Nico 1 2020 Multiparty cardinality testing for threshold private intersection. Zbl 07450200Branco, Pedro; Döttling, Nico; Pu, Sihang 2 2021 Candidate iO from homomorphic encryption schemes. Zbl 1479.94137Brakerski, Zvika; Döttling, Nico; Garg, Sanjam; Malavolta, Giulio 6 2020 Lossiness and entropic hardness for ring-LWE. Zbl 1479.94136Brakerski, Zvika; Döttling, Nico 1 2020 Trapdoor hash functions and their applications. Zbl 1436.94054Döttling, Nico; Garg, Sanjam; Ishai, Yuval; Malavolta, Giulio; Mour, Tamer; Ostrovsky, Rafail 7 2019 Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles. Zbl 1455.94132Brakerski, Zvika; Döttling, Nico; Garg, Sanjam; Malavolta, Giulio 5 2019 Continuous non-malleable codes in the 8-split-state model. Zbl 1430.94052Aggarwal, Divesh; Döttling, Nico; Nielsen, Jesper Buus; Obremski, Maciej; Purwanto, Erick 3 2019 Ring signatures: logarithmic-size, no setup – from standard assumptions. Zbl 07162731Backes, Michael; Döttling, Nico; Hanzlik, Lucjan; Kluczniak, Kamil; Schneider, Jonas 3 2019 Efficient UC commitment extension with homomorphism for free (and applications). Zbl 1455.94135Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Dowsley, Rafael; Giacomelli, Irene 1 2019 Two-message statistically sender-private OT from LWE. Zbl 1430.94060Brakerski, Zvika; Döttling, Nico 10 2018 New constructions of identity-based and key-dependent message secure encryption schemes. Zbl 1385.94035Döttling, Nico; Garg, Sanjam; Hajiabadi, Mohammad; Masny, Daniel 8 2018 Identity-based encryption from the Diffie-Hellman assumption. Zbl 1385.94033Döttling, Nico; Garg, Sanjam 15 2017 Laconic oblivious transfer and its applications. Zbl 1409.94866Cho, Chongwon; Döttling, Nico; Garg, Sanjam; Gupta, Divya; Miao, Peihan; Polychroniadou, Antigoni 6 2017 From selective IBE to full IBE and selective HIBE. Zbl 1385.94034Döttling, Nico; Garg, Sanjam 5 2017 Cryptanalysis of indistinguishability obfuscations of circuits over GGH13. Zbl 1441.94068Apon, Daniel; Döttling, Nico; Garg, Sanjam; Mukherjee, Pratyay 3 2017 Concurrently composable security with shielded super-polynomial simulators. Zbl 1411.94051Broadnax, Brandon; Döttling, Nico; Hartung, Gunnar; Müller-Quade, Jörn; Nagel, Matthias 1 2017 Linear-time non-malleable codes in the bit-wise independent tampering model. Zbl 1417.94053Cramer, Ronald; Damgård, Ivan; Döttling, Nico; Giacomelli, Irene; Xing, Chaoping 1 2017 Rate-1, linear time and additively homomorphic UC commitments. Zbl 1406.94035Cascudo, Ignacio; Damgård, Ivan; David, Bernardo; Döttling, Nico; Nielsen, Jesper Buus 5 2016 Two-message, oblivious evaluation of cryptographic functionalities. Zbl 1406.94046Döttling, Nico; Fleischhacker, Nils; Krupp, Johannes; Schröder, Dominique 1 2016 Low noise LPN: KDM secure public key encryption and sample amplification. Zbl 1345.94057Döttling, Nico 9 2015 Linear secret sharing schemes from error correcting codes and universal hash functions. Zbl 1371.94665Cramer, Ronald; Damgård, Ivan Bjerre; Döttling, Nico; Fehr, Serge; Spini, Gabriele 9 2015 Efficient pseudorandom functions via on-the-fly adaptation. Zbl 1375.94092Döttling, Nico; Schröder, Dominique 8 2015 General statistically secure computation with bounded-resettable hardware tokens. Zbl 1354.94027Döttling, Nico; Kraschewski, Daniel; Müller-Quade, Jörn; Nilges, Tobias 3 2015 From stateful hardware to resettable hardware using symmetric assumptions. Zbl 1388.94051Döttling, Nico; Kraschewski, Daniel; Müller-Quade, Jörn; Nilges, Tobias 3 2015 Lossy codes and a new variant of the learning-with-errors problem. Zbl 1300.94052Döttling, Nico; Müller-Quade, Jörn 7 2013 Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens. Zbl 1315.94069Döttling, Nico; Mie, Thilo; Müller-Quade, Jörn; Nilges, Tobias 4 2013 IND-CCA secure cryptography based on a variant of the LPN problem. Zbl 1292.94056Döttling, Nico; Müller-Quade, Jörn; Nascimento, Anderson C. A. 8 2012 A CCA2 secure variant of the McEliece cryptosystem. Zbl 1364.94534Döttling, Nico; Dowsley, Rafael; Müller-Quade, Jörn; Nascimento, Anderson C. A. 4 2012 Unconditional and composable security using a single stateful Tamper-proof hardware token. Zbl 1295.94055Döttling, Nico; Kraschewski, Daniel; Müller-Quade, Jörn 5 2011 all cited Publications top 5 cited Publications all top 5 Cited by 237 Authors 5 Venturi, Daniele 4 Döttling, Nico 4 Garg, Sanjam 4 Jain, Abhishek 4 Khurana, Dakshita 4 Masny, Daniel 4 Tanaka, Keisuke 4 Zhang, Jiang 3 Agrawal, Shweta 3 Ananth, Prabhanjan Vijendra 3 Badrinarayanan, Saikrishna 3 Bogos, Sonia 3 Brakerski, Zvika 3 Hajiabadi, Mohammad 3 Hazay, Carmit 3 Jain, Aayush 3 Jin, Zhengzhong 3 Lin, Huijia 3 Lombardi, Alex 3 Nielsen, Jesper Buus 3 Ostrovsky, Rafail 3 Polychroniadou, Antigoni 3 Scholl, Peter 3 Segev, Gil 3 Takayasu, Atsushi 3 Vaudenay, Serge 3 Yu, Yu 2 Biagioni, Silvio 2 Boyen, Xavier 2 Branco, Pedro 2 Chen, Yilei 2 Choi, Seung Geol 2 Coretti, Sandro 2 Dodis, Yevgeniy 2 Emura, Keita 2 Faust, Sebastian 2 Fouque, Pierre-Alain 2 Fujisaki, Eiichiro 2 Gu, Dawu 2 Han, Shuai 2 Hara, Keisuke 2 Herold, Gottfried 2 Ishai, Yuval 2 Kitagawa, Fuyuki 2 Li, Qinyi 2 Liu, Shengli 2 Malavolta, Giulio 2 Matsuda, Takahiro 2 Nguyen, Khoa 2 Reyzin, Leonid 2 Rotem, Lior 2 Safavi-Naini, Reihaneh 2 Schröder, Dominique 2 Susilo, Willy 2 Tackmann, Björn 2 Turchenko, O. Yu. 2 Venkitasubramaniam, Muthuramakrishnan 2 Visconti, Ivan 2 Wang, Huaxiong 2 Watanabe, Yodai 2 Wee, Hoeteck 2 Wichs, Daniel 1 Au, Man Ho 1 Bai, Shi 1 Baldi, Marco 1 Baum, Carsten 1 Benhamouda, Fabrice 1 Bitansky, Nir 1 Bogdanov, Andrej 1 Bootland, Carl 1 Burdges, Jeffrey 1 Canetti, Ran 1 Cao, Zhenfu 1 Castryck, Wouter 1 Chang, Jinyong 1 Chatterjee, Rohit 1 Chen, Jie 1 Chen, Kefei 1 Chen, Yu 1 Cheraghchi, Mahdi 1 Chiaraluce, Franco 1 Cho, Wonhee 1 Choudhuri, Arka Rai 1 Dachman-Soled, Dana 1 Damgård, Ivan Bjerre 1 David, Bernardo Machado 1 De Feo, Luca 1 Deng, Yi 1 Desmedt, Yvo G. 1 Desmoulins, Nicolas 1 Ding, Zhimin 1 Dinur, Itai 1 Dowsley, Rafael 1 Dutta, Sabyasachi 1 Dziembowski, Stefan 1 Esgin, Muhammed F. 1 Fang, Fuyang 1 Farràs, Oriol 1 Feng, Dengguo 1 Feng, Shengyuan ...and 137 more Authors all top 5 Cited in 13 Serials 10 Journal of Cryptology 8 Theoretical Computer Science 8 Designs, Codes and Cryptography 2 SIAM Journal on Computing 2 Cryptography and Communications 1 Information Sciences 1 Information and Computation 1 Mathematical Problems in Engineering 1 Science in China. Series F 1 Journal of Mathematical Cryptology 1 Advances in Mathematics of Communications 1 Prikladnaya Diskretnaya Matematika 1 Matematicheskie Voprosy Kriptografii all top 5 Cited in 7 Fields 96 Information and communication theory, circuits (94-XX) 40 Computer science (68-XX) 5 Number theory (11-XX) 4 Quantum theory (81-XX) 1 Commutative algebra (13-XX) 1 Probability theory and stochastic processes (60-XX) 1 Statistics (62-XX) Citations by Year