Anja Lehmann
Anja Lehmann
Hasso Plattner Institute, University of Potsdam
Verified email at hpi.de
Title
Cited by
Cited by
Year
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
International conference on the theory and application of cryptology and …, 2011
3032011
Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, ...
International Workshop on Public Key Cryptography, 317-336, 2009
1532009
Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schröder
International Workshop on Public Key Cryptography, 444-461, 2010
972010
Random oracles with (out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2010
812010
On the joint security of encryption and signature in EMV
JP Degabriele, A Lehmann, KG Paterson, NP Smart, M Strefler
Cryptographers’ Track at the RSA Conference, 116-135, 2012
652012
Anonymous attestation using the strong diffie hellman assumption revisited
J Camenisch, M Drijvers, A Lehmann
International Conference on Trust and Trustworthy Computing, 1-20, 2016
632016
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ...
IFIP Working Conference on Policies and Research in Identity Management, 34-52, 2013
522013
Universally composable direct anonymous attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography--PKC 2016, 234-264, 2016
502016
Optimal distributed password verification
J Camenisch, A Lehmann, G Neven
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
482015
The wonderful world of global random oracles
J Camenisch, M Drijvers, T Gagliardoni, A Lehmann, G Neven
Annual International Conference on the Theory and Applications of …, 2018
442018
One TPM to bind them all: Fixing TPM 2.0 for provably secure anonymous attestation
J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian
2017 IEEE Symposium on Security and Privacy (SP), 901-920, 2017
432017
Formal treatment of privacy-enhancing credential systems
J Camenisch, S Krenn, A Lehmann, GL Mikkelsen, G Neven, ...
International Conference on Selected Areas in Cryptography, 3-24, 2015
432015
D2. 1 Architecture for Attribute-based Credential Technologies
J Camenisch, I Krontiris, A Lehmann, G Neven, C Paquin, K Rannenberg, ...
Deliverable, ABC4Trust EU Project, 2011
432011
History-free aggregate message authentication codes
O Eikemeier, M Fischlin, JF Götzmann, A Lehmann, D Schröder, ...
International Conference on Security and Cryptography for Networks, 309-328, 2010
432010
Memento: How to reconstruct your secrets from a single password in a hostile environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Annual Cryptology Conference, 256-275, 2014
402014
Electronic identities need private credentials
J Camenisch, A Lehmann, G Neven
IEEE Security & Privacy 10 (1), 80-83, 2012
332012
Sanitizable signatures: How to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schröder
BIOSIG 2009: biometrics and electronic signatures, 2009
322009
Public-key encryption with non-interactive opening: New constructions and stronger definitions
D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, ...
International Conference on Cryptology in Africa, 333-350, 2010
312010
Updatable encryption with post-compromise security
A Lehmann, B Tackmann
Annual International Conference on the Theory and Applications of …, 2018
302018
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, RR Enderlein, A Lehmann, G Neven, ...
Journal of information security and applications 19 (1), 25-44, 2014
302014
The system can't perform the operation now. Try again later.
Articles 1–20