Search Results - "Fehr, Serge"

Refine Results
  1. 1

    A monogamy-of-entanglement game with applications to device-independent quantum cryptography by Tomamichel, Marco, Fehr, Serge, Kaniewski, J drzej, Wehner, Stephanie

    Published in New journal of physics (02-10-2013)
    “…We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement…”
    Get full text
    Journal Article
  2. 2

    Algebraic manipulation detection codes by Cramer, Ronald, Fehr, Serge, Padró, Carles

    Published in Science China. Mathematics (01-07-2013)
    “…Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that…”
    Get full text
    Journal Article
  3. 3

    Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks by Fehr, Serge, Hofheinz, Dennis, Kiltz, Eike, Wee, Hoeteck

    “…Imagine many small devices send data to a single receiver, encrypted using the receiver’s public key. Assume an adversary that has the power to adaptively…”
    Get full text
    Book Chapter
  4. 4

    Short Non-Malleable Codes from Related-Key Secure Block Ciphers by Fehr, Serge, Karpman, Pierre, Mennink, Bart

    Published in IACR Transactions on Symmetric Cryptology (01-01-2018)
    “…A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original…”
    Get full text
    Journal Article
  5. 5

    On the Conditional Rényi Entropy by Fehr, Serge, Berens, Stefan

    Published in IEEE transactions on information theory (01-11-2014)
    “…The Rényi entropy of general order unifies the well-known Shannon entropy with several other entropy notions, like the min-entropy or collision entropy. In…”
    Get full text
    Journal Article
  6. 6

    Fiat–Shamir Transformation of Multi-Round Interactive Proofs (Extended Version) by Attema, Thomas, Fehr, Serge, Klooß, Michael

    Published in Journal of cryptology (01-10-2023)
    “…The celebrated Fiat–Shamir transformation turns any public-coin interactive proof into a non-interactive one, which inherits the main security properties (in…”
    Get full text
    Journal Article
  7. 7

    Quantum Cryptography by Fehr, Serge

    Published in Foundations of physics (01-05-2010)
    “…Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always),…”
    Get full text
    Journal Article
  8. 8

    Secure identification and QKD in the bounded-quantum-storage model by Damgård, Ivan, Fehr, Serge, Salvail, Louis, Schaffner, Christian

    Published in Theoretical computer science (04-12-2014)
    “…We consider the problem of secure identification: user U proves to server S that he knows an agreed (possibly low-entropy) password w, while giving away as…”
    Get full text
    Journal Article
  9. 9

    New Approach to Privacy-Preserving Clinical Decision Support Systems for HIV Treatment by Spini, Gabriele, Mancini, Emiliano, Attema, Thomas, Abspoel, Mark, de Gier, Jan, Fehr, Serge, Veugen, Thijs, van Heesch, Maran, Worm, Daniël, De Luca, Andrea, Cramer, Ronald, Sloot, Peter M.A.

    Published in Journal of medical systems (20-10-2022)
    “…Background HIV treatment prescription is a complex process. Clinical decision support systems (CDSS) are a category of health information technologies that can…”
    Get full text
    Journal Article
  10. 10
  11. 11

    Short Non-Malleable Codes from Related-Key Secure Block Ciphers by Fehr, Serge, Karpman, Pierre, Mennink, Bart

    Published in IACR Transactions on Symmetric Cryptology (01-03-2018)
    “…A non-malleable code is an unkeyed randomized encoding scheme that offers the strong guarantee that decoding a tampered codeword either results in the original…”
    Get full text
    Journal Article
  12. 12

    Adaptive versus Static Multi-oracle Algorithms, and Quantum Security of a Split-key PRF by Don, Jelle, Fehr, Serge, Huang, Yu-Hsuan

    Published 16-06-2022
    “…In the first part of the paper, we show a generic compiler that transforms any oracle algorithm that can query multiple oracles adaptively, i.e., can decide on…”
    Get full text
    Journal Article
  13. 13

    The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More by Don, Jelle, Fehr, Serge, Majenz, Christian

    Published 07-03-2022
    “…In: Micciancio D., Ristenpart T. (eds) Advances in Cryptology -- CRYPTO 2020. CRYPTO 2020. Lecture Notes in Computer Science, vol 12172. Springer, Cham We…”
    Get full text
    Journal Article
  14. 14

    Efficient NIZKs and Signatures from Commit-and-Open Protocols in the QROM by Don, Jelle, Fehr, Serge, Majenz, Christian, Schaffner, Christian

    Published 28-02-2022
    “…Commit-and-open Sigma-protocols are a popular class of protocols for constructing non-interactive zero-knowledge arguments and digital-signature schemes via…”
    Get full text
    Journal Article
  15. 15

    Quantum Authentication and Encryption with Key Recycling by Fehr, Serge, Salvail, Louis

    Published 18-10-2016
    “…We propose an information-theoretically secure encryption scheme for classical messages with quantum ciphertexts that offers detection of eavesdropping…”
    Get full text
    Journal Article
  16. 16

    Online-Extractability in the Quantum Random-Oracle Model by Don, Jelle, Fehr, Serge, Majenz, Christian, Schaffner, Christian

    Published 04-03-2021
    “…We show the following generic result. Whenever a quantum query algorithm in the quantum random-oracle model outputs a classical value $t$ that is promised to…”
    Get full text
    Journal Article
  17. 17

    Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model by Don, Jelle, Fehr, Serge, Majenz, Christian, Schaffner, Christian

    Published 27-07-2020
    “…Advances in Cryptology - CRYPTO 2019. Lecture Notes in Computer Science, vol 11693. Springer, Cham The famous Fiat-Shamir transformation turns any public-coin…”
    Get full text
    Journal Article
  18. 18

    On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments by Fehr, Serge, Fillinger, Max

    Published 01-07-2015
    “…We consider the related notions of two-prover and of relativistic commitment schemes. In recent work, Lunghi et al. proposed a new relativistic commitment…”
    Get full text
    Journal Article
  19. 19

    Multi-Prover Commitments Against Non-Signaling Attacks by Fehr, Serge, Fillinger, Max

    Published 12-05-2015
    “…We reconsider the concept of multi-prover commitments, as introduced in the late eighties in the seminal work by Ben-Or et al. As was recently shown by…”
    Get full text
    Journal Article
  20. 20

    On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work by Chung, Kai-Min, Fehr, Serge, Huang, Yu-Hsuan, Liao, Tai-Ning

    Published 22-10-2020
    “…We revisit the so-called compressed oracle technique, introduced by Zhandry for analyzing quantum algorithms in the quantum random oracle model (QROM). To…”
    Get full text
    Journal Article