Gardham, Daniel; Manulis, Mark Revocable hierarchical attribute-based signatures from lattices. (English) Zbl 1512.94111 Ateniese, Giuseppe (ed.) et al., Applied cryptography and network security. 20th international conference, ACNS 2022, Rome, Italy, June 20–23, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13269, 459-479 (2022). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Gardham} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 13269, 459--479 (2022; Zbl 1512.94111) Full Text: DOI
Gardham, Daniel; Manulis, Mark; Drăgan, Constantin Cătălin Biometric-authenticated searchable encryption. (English) Zbl 07314384 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12147, 40-61 (2020). MSC: 68M25 94A60 PDFBibTeX XMLCite \textit{D. Gardham} et al., Lect. Notes Comput. Sci. 12147, 40--61 (2020; Zbl 07314384) Full Text: DOI Link
Gardham, Daniel; Manulis, Mark Hierarchical attribute-based signatures: short keys and optimal signature length. (English) Zbl 1458.94302 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 89-109 (2019). MSC: 94A62 PDFBibTeX XMLCite \textit{D. Gardham} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 11464, 89--109 (2019; Zbl 1458.94302) Full Text: DOI Link
Drǎgan, Constantin-Cǎtǎlin; Gardham, Daniel; Manulis, Mark Hierarchical attribute-based signatures. (English) Zbl 1518.94112 Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 213-234 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C.-C. Drǎgan} et al., Lect. Notes Comput. Sci. 11124, 213--234 (2018; Zbl 1518.94112) Full Text: DOI
Chen, Liqun (ed.); Manulis, Mark (ed.); Schneider, Steve (ed.) Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. (English) Zbl 1398.68020 Lecture Notes in Computer Science 11060. Cham: Springer (ISBN 978-3-319-99135-1/pbk; 978-3-319-99136-8/ebook). xi, 522 p. (2018). MSC: 68-06 68P25 00B25 PDFBibTeX XMLCite \textit{L. Chen} (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9--12, 2018. Proceedings. Cham: Springer (2018; Zbl 1398.68020) Full Text: DOI arXiv
Kiefer, Franziskus; Manulis, Mark Universally composable two-server PAKE. (English) Zbl 1397.68062 Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 147-166 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Kiefer} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 9866, 147--166 (2016; Zbl 1397.68062) Full Text: DOI Link
Kiefer, Franziskus; Manulis, Mark Blind password registration for two-server password authenticated key exchange and secret sharing protocols. (English) Zbl 1397.94079 Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 95-114 (2016). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{F. Kiefer} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 9866, 95--114 (2016; Zbl 1397.94079) Full Text: DOI Link
Manulis, Mark (ed.); Sadeghi, Ahmad-Reza (ed.); Schneider, Steve (ed.) Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. (English) Zbl 1337.94004 Lecture Notes in Computer Science 9696. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). xiv, 668 p. (2016). MSC: 94-06 68-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{M. Manulis} (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19--22, 2016. Proceedings. Cham: Springer (2016; Zbl 1337.94004) Full Text: DOI
Kiefer, Franziskus; Manulis, Mark Oblivious PAKE: efficient handling of password trials. (English) Zbl 1397.94080 Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 191-208 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{F. Kiefer} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 9290, 191--208 (2015; Zbl 1397.94080) Full Text: DOI
Kiefer, Franziskus; Manulis, Mark Distributed smooth projective hashing and its application to two-server password authenticated key exchange. (English) Zbl 1353.94056 Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 199-216 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{F. Kiefer} and \textit{M. Manulis}, Lect. Notes Comput. Sci. 8479, 199--216 (2014; Zbl 1353.94056) Full Text: DOI
Wang, Yang; Manulis, Mark; Au, Man Ho; Susilo, Willy Relations among privacy notions for signcryption and key invisible “Sign-then-encrypt”. (English) Zbl 1316.94105 Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 187-202 (2013). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 7959, 187--202 (2013; Zbl 1316.94105) Full Text: DOI Link
González Nieto, Juan Manuel; Manulis, Mark; Sun, Dongdong Forward-secure hierarchical predicate encryption. (English) Zbl 1305.94051 Abdalla, Michel (ed.) et al., Pairing-based cryptography – Pairing 2012. 5th international conference, Cologne, Germany, May 16–18, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36333-7/pbk). Lecture Notes in Computer Science 7708, 83-101 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. M. González Nieto} et al., Lect. Notes Comput. Sci. 7708, 83--101 (2013; Zbl 1305.94051) Full Text: DOI Link
Pieprzyk, Josef (ed.); Sadeghi, Ahmad-Reza (ed.); Manulis, Mark (ed.) Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12–14, 2012. Proceedings. (English) Zbl 1295.68028 Lecture Notes in Computer Science 7712. Berlin: Springer (ISBN 978-3-642-35404-5/pbk). xvi, 311 p. (2012). MSC: 68-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{J. Pieprzyk} (ed.) et al., Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12--14, 2012. Proceedings. Berlin: Springer (2012; Zbl 1295.68028)
González Nieto, Juan Manuel; Manulis, Mark; Poettering, Bertram; Rangasamy, Jothi; Stebila, Douglas Publicly verifiable ciphertexts. (English) Zbl 1344.94047 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. M. González Nieto} et al., Lect. Notes Comput. Sci. 7485, 393--410 (2012; Zbl 1344.94047) Full Text: DOI Link
González-Nieto, Juan Manuel; Manulis, Mark; Sun, Dongdong Fully private revocable predicate encryption. (English) Zbl 1308.94074 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 350-363 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. M. González-Nieto} et al., Lect. Notes Comput. Sci. 7372, 350--363 (2012; Zbl 1308.94074) Full Text: DOI Link
Fujioka, Atsushi; Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant Sufficient condition for ephemeral key-leakage resilient tripartite key exchange. (English) Zbl 1305.94047 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 15-28 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Fujioka} et al., Lect. Notes Comput. Sci. 7372, 15--28 (2012; Zbl 1305.94047) Full Text: DOI Link
Fischlin, Marc (ed.); Buchmann, Johannes (ed.); Manulis, Mark (ed.) Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. (English) Zbl 1241.94004 Lecture Notes in Computer Science 7293. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). xiv, 734 p. (2012). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{M. Fischlin} (ed.) et al., Public key cryptography -- PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21--23, 2012. Proceedings. Berlin: Springer (2012; Zbl 1241.94004) Full Text: DOI
Fischlin, Marc; Libert, Benoît; Manulis, Mark Non-interactive and re-usable universally composable string commitments with adaptive security. (English) Zbl 1227.94044 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 468-485 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Fischlin} et al., Lect. Notes Comput. Sci. 7073, 468--485 (2011; Zbl 1227.94044) Full Text: DOI
Manulis, Mark; Poettering, Bertram Affiliation-hiding authentication with minimal bandwidth consumption. (English) Zbl 1443.94096 Ardagna, Claudio A. (ed.) et al., Information security theory and practice. Security and privacy of mobile devices in wireless communication. 5th IFIP WG 11.2 international workshop, WISTP 2011, Heraklion, Crete, Greece, June 1–3, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6633, 85-99 (2011). MSC: 94A62 PDFBibTeX XML Full Text: DOI
De Cristofaro, Emiliano; Manulis, Mark; Poettering, Bertram Private discovery of common social contacts. (English) Zbl 1443.94054 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 147-165 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. De Cristofaro} et al., Lect. Notes Comput. Sci. 6715, 147--165 (2011; Zbl 1443.94054) Full Text: DOI Link
Manulis, Mark; Poettering, Bertram; Tsudik, Gene Taming big brother ambitions: More privacy for secret handshakes. (English) Zbl 1443.94098 Atallah, Mikhail J. (ed.) et al., Privacy enhancing technologies. 10th international symposium, PETS 2010, Berlin, Germany, July 21–23, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6205, 149-165 (2010). MSC: 94A62 68P25 PDFBibTeX XML Full Text: DOI
Manulis, Mark; Suzuki, Koutarou; Ustaoglu, Berkant Modeling leakage of ephemeral secrets in tripartite/group key exchange. (English) Zbl 1305.94063 Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 16-33 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Manulis} et al., Lect. Notes Comput. Sci. 5984, 16--33 (2010; Zbl 1305.94063) Full Text: DOI Link
Gorantla, M. Choudary; Boyd, Colin; González Nieto, Juan Manuel; Manulis, Mark Generic one round group key exchange in the standard model. (English) Zbl 1305.94052 Lee, Donghoon (ed.) et al., Information, security and cryptology – ICISC 2009. 12th international conference, Seoul, Korea, December 2–4, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-14422-6/pbk). Lecture Notes in Computer Science 5984, 1-15 (2010). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. C. Gorantla} et al., Lect. Notes Comput. Sci. 5984, 1--15 (2010; Zbl 1305.94052) Full Text: DOI Link
Manulis, Mark; Pinkas, Benny; Poettering, Bertram Privacy-preserving group discovery with linear complexity. (English) Zbl 1443.94095 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 420-437 (2010). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{M. Manulis} et al., Lect. Notes Comput. Sci. 6123, 420--437 (2010; Zbl 1443.94095) Full Text: DOI
Manulis, Mark; Poettering, Bertram; Tsudik, Gene Affiliation-hiding key exchange with untrusted group authorities. (English) Zbl 1443.94097 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6123, 402-419 (2010). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{M. Manulis} et al., Lect. Notes Comput. Sci. 6123, 402--419 (2010; Zbl 1443.94097) Full Text: DOI
Brzuska, Christina; Busch, Heike; Dagdelen, Oezguer; Fischlin, Marc; Franz, Martin; Katzenbeisser, Stefan; Manulis, Mark; Onete, Cristina; Peter, Andreas; Poettering, Bertram; Schröder, Dominique Redactable signatures for tree-structured data: definitions and constructions. (English) Zbl 1315.94112 Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 87-104 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{C. Brzuska} et al., Lect. Notes Comput. Sci. 6123, 87--104 (2010; Zbl 1315.94112) Full Text: DOI
Dent, Alexander W.; Fischlin, Marc; Manulis, Mark; Stam, Martijn; Schröder, Dominique Confidential signatures and deterministic signcryption. (English) Zbl 1281.94078 Nguyen, Phong Q. (ed.) et al., Public key cryptography – PKC 2010. 13th international conference on practice and theory in public key cryptography, Paris, France, May 26–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13012-0/pbk). Lecture Notes in Computer Science 6056, 462-479 (2010). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{A. W. Dent} et al., Lect. Notes Comput. Sci. 6056, 462--479 (2010; Zbl 1281.94078) Full Text: DOI
Abdalla, Michel; Chevalier, Céline; Manulis, Mark; Pointcheval, David Flexible group key exchange with on-demand computation of subgroup keys. (English) Zbl 1284.94049 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 351-368 (2010). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{M. Abdalla} et al., Lect. Notes Comput. Sci. 6055, 351--368 (2010; Zbl 1284.94049) Full Text: DOI Link
Galindo, David; Libert, Benoît; Fischlin, Marc; Fuchsbauer, Georg; Lehmann, Anja; Manulis, Mark; Schröder, Dominique Public-key encryption with non-interactive opening: new constructions and stronger definitions. (English) Zbl 1284.94074 Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 333-350 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Galindo} et al., Lect. Notes Comput. Sci. 6055, 333--350 (2010; Zbl 1284.94074) Full Text: DOI
Brecher, Timo; Bresson, Emmanuel; Manulis, Mark Fully robust tree-Diffie-Hellman group key exchange. (English) Zbl 1287.94058 Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 478-497 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Brecher} et al., Lect. Notes Comput. Sci. 5888, 478--497 (2009; Zbl 1287.94058) Full Text: DOI Link
Gajek, Sebastian; Manulis, Mark; Schwenk, Jorg User-aware provably secure protocols for browser-based mutual authentication. (English) Zbl 1171.94347 Int. J. Appl. Cryptogr. 1, No. 4, 290-308 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Gajek} et al., Int. J. Appl. Cryptogr. 1, No. 4, 290--308 (2009; Zbl 1171.94347) Full Text: DOI
Bresson, Emmanuel; Manulis, Mark Securing group key exchange against strong corruptions and key registration attacks. (English) Zbl 1154.94380 Int. J. Appl. Cryptogr. 1, No. 2, 91-107 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Bresson} and \textit{M. Manulis}, Int. J. Appl. Cryptogr. 1, No. 2, 91--107 (2008; Zbl 1154.94380) Full Text: DOI
Gajek, Sebastian; Manulis, Mark; Pereira, Olivier; Sadeghi, Ahmad-Reza; Schwenk, Jörg Universally composable security analysis of TLS. (English) Zbl 1204.94068 Baek, Joonsang (ed.) et al., Provable security. Second international conference, ProvSec 2008, Shanghai, China, October 30–November 1, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88732-4/pbk). Lecture Notes in Computer Science 5324, 313-327 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Gajek} et al., Lect. Notes Comput. Sci. 5324, 313--327 (2008; Zbl 1204.94068) Full Text: DOI
Chen, Liqun; Löhr, Hans; Manulis, Mark; Sadeghi, Ahmad-Reza Property-based attestation without a trusted third party. (English) Zbl 1181.94110 Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 31-46 (2008). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{L. Chen} et al., Lect. Notes Comput. Sci. 5222, 31--46 (2008; Zbl 1181.94110) Full Text: DOI
Gajek, Sebastian; Manulis, Mark; Schwenk, Jörg Enforcing user-aware browser-based mutual authentication with strong locked same origin policy. (English) Zbl 1279.94135 Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 6-20 (2008). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{S. Gajek} et al., Lect. Notes Comput. Sci. 5107, 6--20 (2008; Zbl 1279.94135) Full Text: DOI Link
Chen, Liqun; Escalante B., Alberto N.; Löhr, Hans; Manulis, Mark; Sadeghi, Ahmad-Reza A privacy-protecting multi-coupon scheme with stronger protection against splitting. (English) Zbl 1195.94051 Dietrich, Sven (ed.) et al., Financial cryptography and data security. 11th international conference, FC 2007, and 1st international workshop on usable security, USEC 2007, Scarborough, Trinidad and Tobago, February 12–16, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77365-8/pbk). Lecture Notes in Computer Science 4886, 29-44 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Chen} et al., Lect. Notes Comput. Sci. 4886, 29--44 (2008; Zbl 1195.94051) Full Text: DOI