• Giorgia Azzurra Marson, Bertram Poettering . Security Notions for Bidirectional Channels. IACR Transactions on Symmetric Cryptology Volume 2017 Issue 1.
    PDF [pdf] Springer Link [published version]

  • David Cash, Eike Kiltz, and Stefano Tessaro. Two-Round Man-in-the-Middle Security from LPN. IACR TCC 2016.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Georg Fuchsbauer, Felix Heuer, Eike Kiltz and Krzysztof Pietrzak. Standard Security Does Imply Security Against Selective Opening for Markov Distributions. IACR TCC 2016.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Tightly Secure CCA-Secure Encryption without Pairings . IACR Cryptology ePrint Archive 2016: 94 (2016).
    PDF [pdf] Bibtex [bibtex]

  • Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, Alon Rosen. On the Hardness of Learning with Rounding over Small Modulus. IACR Cryptology ePrint Archive 2015: 769 (2015), IACR TCC 2016-A.
    PDF [pdf] Springer Link [published version]

  • Julian Loss, Ueli Maurer, Daniel Tschudi. Hierarchy of three-party consistency specifications. ISIT 2016: 3048-3052.
    PDF [pdf] Bibtex [bibtex]

  • Eike Kiltz, Daniel Masny, Jiaxin Pan. Optimal Security Proofs for Signatures from Identification Schemes. IACR Cryptology ePrint Archive 2016: 191 (2016), CRYPTO (2) 2016: 33-61.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Sebastian Faust, Daniel Masny, Daniele Venturi. Chosen-Ciphertext Security from Subset Sum. IACR Cryptology ePrint Archive 2015: 1223 (2015), Public Key Cryptography (1) 2016: 35-46.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Tightly CCA-Secure Encryption Without Pairings. EUROCRYPT (1) 2016: 1-27.
    Springer Link [published version] Bibtex [bibtex]

  • Weiqiang Wen, Libin Wang, Jiaxin Pan. Unified security model of authenticated key exchange with specific adversarial capabilities. IET Information Security 10(1): 8-17 (2016).
    URL [url] Bibtex [bibtex]

  • Silvio Biagioni, Daniel Masny, Daniele Venturi. Naor-Yung Paradigm with Shared Randomness and Applications.. SCN 2016: 62-80.
    Springer Link [published version] Bibtex [bibtex]

  • Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider. Strong 8-bit Sboxes with Efficient Masking in Hardware. IACR Cryptology ePrint Archive 2016: 647 (2016), CHES 2016: 171-193.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Romain Poussier, François-Xavier Standaert, Vincent Grosso. Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach. IACR Cryptology ePrint Archive 2016: 571 (2016), CHES 2016: 61-81.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Felix Heuer, Bertram Poettering. Selective Opening Security from Simulatable Data Encapsulation. Proceedings of IACR ASIACRYPT 2016, Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Jean Paul Degabriele, Pooya Farshim, Bertram Poettering. A More Cautious Approach to Security Against Mass Surveillance. FSE 2015.


  • Bertram Poettering, Dale Sibborn. Cold boot attacks in the discrete logarithm setting. CT-RSA 2015 .


  • David Cash, Rafael Dowsley, Eike Kiltz. Digital Signatures from Strong RSA without Prime Generation. IACR PKC 2015.


  • Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge. On the Selective Opening Security of Practical Public-Key Encryption Schemes. Public Key Cryptography 2015: 27-511, IACR Cryptology ePrint Archive 2016: 342 (2016).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Hoeteck Wee. Quasi-Adaptive NIZK for Linear Subspaces Revisited. IACR EUROCRYPT 2015.
    PDF [pdf]

  • Eike Kiltz, Jiaxin Pan, Hoeteck Wee. Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptology ePrint Archive 2015: 604 (2015), CRYPTO (2) 2015: 275-295.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li. Tightly-Secure Authenticated Key Exchange. IACR TCC 2015.
    PDF [pdf]

  • Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan. Tightly-Secure Signatures from Chameleon Hash Functions. IACR PKC 2015.
    PDF [pdf] Slides [slides] Bibtex [bibtex]

  • Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti. Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. IACR Cryptology ePrint Archive 2015: 317 (2015), Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers.
    PDF [pdf] Springer Link [published version]

  • Eike Kiltz, Daniel Masny, Jiaxin Pan. Schnorr Signatures in the Multi-User Setting. IACR Cryptology ePrint Archive 2015: 1122 (2015).
    URL [url] Bibtex [bibtex]

  • Sonia Belaïd, Vincent Grosso, François-Xavier Standaert. Masking and leakage-resilient primitives: One, the other(s) or both?. IACR Cryptology ePrint Archive 2015: 492 (2015), Cryptography and Communications 7(1): 163-184 (2015).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, François-Xavier Standaert. ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?. IACR Cryptology ePrint Archive 2015: 535 (2015), ASIACRYPT (2) 2015: 291-312.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Romain Poussier, Vincent Grosso, François-Xavier Standaert. Comparing Approaches to Rank Estimation for Side-Channel Security Evaluations. CARDIS 2015: 125-142.
    Springer Link [published version] Bibtex [bibtex]

  • Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. IACR Cryptology ePrint Archive 2014: 920 (2014), FSE 2015: 117-129.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Olivier Blazy, Eike Kiltz, Jiaxin Pan. (Hierarchical) Identity-Based Encryption from Affine Message Authentication. Proceedings of IACR CRYPTO 2014, (1) 408--425. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper). ASIACRYPT 2014.
    Springer Link [published version]

  • Jason Crampton, Naomi Farley, Gregory Gutin, Mark Jones, Bertram Poettering. Cryptographic Enforcement of Information Flow Policies without Public Information. arXiv:1410.5567.
    URL [url]

  • Bertram Poettering, Douglas Stebila. Double-Authentication-Preventing Signatures. ESORICS 2014, IACR ePrint 2013/333.
    PDF [pdf] Springer Link [published version]

  • Giorgia Azzurra Marson, Bertram Poettering. Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators. ESORICS 2014.
    Springer Link [published version]

  • Felix Günther, Bertram Poettering. Linkable Message Tagging: Solving the key distribution problem of signature schemes. IACR ePrint 2014/014.
    PDF [pdf]

  • Alexandre Pinto, Bertram Poettering, Jacob C.N. Schuldt. Multi-Recipient Encryption, Revisited. ASIACCS 2014.
    URL [url]

  • Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. Plaintext Recovery Attacks Against WPA/TKIP. Fast Software Encryption 2014 (to appear).
    PDF [pdf]

  • Eike Kiltz, Daniel Masny, Krzysztof Pietrzak. Simple Chosen-Ciphertext Security from Low-Noise LPN. Public Key Cryptography 2014: 1-18, IACR Cryptology ePrint Archive 2015: 401 (2015).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Josep Balasch, Benedikt Gierlichs, Vincent Grosso, Oscar Reparaz, François-Xavier Standaert. On the Cost of Lazy Engineering for Masked Software Implementations. IACR Cryptology ePrint Archive 2014: 413 (2014), CARDIS 2014: 64-81.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, Emmanuel Prouff, François-Xavier Standaert. Efficient Masked S-Boxes Processing - A Step Forward -. AFRICACRYPT 2014: 251-266.
    Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar. Combining Leakage-Resilient PRFs and Shuffling - Towards Bounded Security for Small Embedded Devices. CARDIS 2014: 122-136.
    Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici. LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. FSE 2014: 18-37.
    Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, Romain Poussier, François-Xavier Standaert, Lubos Gaspar. Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices). IACR Cryptology ePrint Archive 2014: 411 (2014).
    PDF [pdf] Bibtex [bibtex]

  • Alex Escala, Gottfried Herold, Eike Kiltz, Carla Rafols, Jorge Villar. An Algebraic Framework for Diffie-Hellman Assumptions. IACR Cryptology ePrint Archive 2013: 377 (2013), CRYPTO (2) 2013: 129-147.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Colin Boyd, Cas Cremers, Michele Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila. ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. ESORICS 2013, IACR ePrint 2013/398.
    PDF [pdf] Springer Link [published version]

  • Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy. Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions. Proceedings of IACR CRYPTO 2013. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Sebastian Faust, Vincent Grosso, François-Xavier Standaert. Masking vs. Multiparty Computation: How Large Is the Gap for AES?. CHES 2013 (Invited to Journal of Cryptographic Engineering).
    Springer Link [published version] Bibtex [bibtex]

  • David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev. More Constructions of Lossy and Correlation-Secure Trapdoor Functions. Journal of Cryptology, Volume 26, Number 1 (2013), Pages 39--74. Full version available on Cryptology ePrint Archive.
    PDF [pdf] Springer Link [published version]

  • Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson. Non-Interactive Key Exchange. Proceedings of IACR PKC 2013, 254-271 LNCS 7778 (2013). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS. USENIX Security 2013.
    URL [url]

  • Nadhem AlFardan, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt. On the Security of RC4 in TLS and WPA. .
    URL [url]

  • Rafael Pass, Alon Rosen, Wei-Lung Dustin Tseng, Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen, Hossein Ghodosi, Eiichiro Fujisaki, Tatsuaki Okamoto, Dennis Hofheinz, Eike Kiltz, Victor Shoup, Antoine Joux, Vanessa Vitse, Andrej Bogdanov, Takanori Isobe. Our Content. Journal of Failure Analysis and Prevention, December 2012, Volume 12, Issue 6, pp. 640--642. © Springer-Verlag.
    Springer Link [published version]

  • Mark Manulis, Bertram Poettering, Douglas Stebila. Plaintext awareness in identity-based key encapsulation. International Journal of Information Security (IJIS, 2013), IACR ePrint 2012/559.
    PDF [pdf] Springer Link [published version]

  • Dennis Hofheinz, Eike Kiltz, Victor Shoup. Practical Chosen Ciphertext Secure Encryption from Factoring. Journal of Cryptology, Volume 26, Number 1 (2013), Pages 102--118.


  • Giorgia Azzurra Marson, Bertram Poettering. Practical Secure Logging: Seekable Sequential Key Generators. ESORICS 2013, IACR ePrint 2013/397.
    PDF [pdf] Springer Link [published version] URL [url]

  • Emiliano De Cristofaro, Mark Manulis, Bertram Poettering. Private discovery of common social contacts. International Journal of Information Security (IJIS, 2013), IACR ePrint 2011/026.
    PDF [pdf] Springer Link [published version]

  • Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering. Pseudorandom signatures. ASIACCS 2013, IACR ePrint 2011/673.
    PDF [pdf] URL [url]

  • Juan Gonz ález Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila. Publicly verifiable ciphertexts. Journal of Computer Security (JCS, 2013), IACR ePrint 2012/357.
    PDF [pdf] Springer Link [published version]

  • Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering. Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. CT-RSA 2013, IACR ePrint 2012/645.
    PDF [pdf] Springer Link [published version]

  • Vadim Lyubashevsky, Daniel Masny. Man-in-the-Middle Secure Authentication Schemes from {LPN} and Weak PRFs. Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Olivier Blazy, Céline Chevalier, Léo Ducas, Jiaxin Pan. Errorless Smooth Projective Hash Function based on LWE. IACR Cryptology ePrint Archive 2013: 821 (2013).
    URL [url] Bibtex [bibtex]

  • Benoît Gérard, Vincent Grosso, María Naya-Plasencia, François-Xavier Standaert. Block Ciphers That Are Easier to Mask: How Far Can We Go?. IACR Cryptology ePrint Archive 2013: 369 (2013), CHES 2013: 383-399.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Vincent Grosso, François-Xavier Standaert, Emmanuel Prouff. Low Entropy Masking Schemes, Revisited. CARDIS 2013: 33-43.
    Springer Link [published version] Bibtex [bibtex]

  • Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Krzysztof Pietrzak, Christof Paar. An Efficient Authentication Protocol Based on Ring-LPN. Proceedings of IACR FSE 2012.


  • David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert. Bonsai Trees, or How to Delegate a Lattice Basis. Journal of Cryptology, Volume 25, Number 4 (2012), Pages 601--639. Full version available on Cryptology ePrint Archive.
    PDF [pdf] Springer Link [published version]

  • Alexander May, Saqib A. Kakvi, Eike Kiltz. Certifying RSA. In Advances in Cryptology (Asiacrypt 2012), Lecture Notes in Computer Science Volume 7658, 404-414, Springer-Verlag, 2012.
    PDF [pdf] Slides [slides] Bibtex [bibtex]

  • Mark Manulis, Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Bertram Poettering. Group Signatures: Authentication with Privacy. In cooperation with BSI (German Federal Office for Information Security), 2012 See also the project website (in German)..
    URL [url]

  • Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters. Identity-Based (Lossy) Trapdoor Functions and Applications. Proceedings of IACR EUROCRYPT 2012. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs. Message Authentication, Revisited. Proceedings of IACR EUROCRYPT 2012.


  • Saqib A. Kakvi, Eike Kiltz. Optimal Security Proofs for Full Domain Hash, Revisited. Proceedings of IACR EUROCRYPT 2012.
    PDF [pdf] Slides [slides] Bibtex [bibtex]

  • Bertram Poettering. Privacy Protection for Authentication Protocols. Ph.D. thesis (Technical University Darmstadt, Jan 2012).
    URL [url]

  • Dennis Hofheinz, Eike Kiltz. Programmable Hash Functions and Their Applications. Journal of Cryptology, Volume 25, Number 3 (2012), Pages 484--527. Full version available on Cryptology ePrint Archive Slides from Leiden workshop.
    PDF [pdf] Springer Link [published version] Slides [slides]

  • Mark Manulis, Bertram Poettering. Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. WISTP 2011 (Best student paper).
    Springer Link [published version]

  • Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi. Efficient Authentication from Hard Learning Problems. Proceedings of IACR EUROCRYPT 2011, 7-26 LNCS 6632 (2011). Best paper award..


  • Mark Manulis, Bertram Poettering. Practical affiliation-hiding authentication from improved polynomial interpolation. ASIACCS 2011, IACR ePrint 2010/659.
    PDF [pdf] URL [url]

  • Dennis Hofheinz, Tibor Jager, Eike Kiltz. Short Signatures from Weaker Assumptions. Proceedings of IACR ASIACRYPT 2011, 647--666 LNCS 7073 (2011). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Jiaxin Pan, Libin Wang, Changshe Ma. Analysis and Improvement of an Authenticated Key Exchange Protocol. ISPEC 2011: 417-431.
    Springer Link [published version] Bibtex [bibtex]

  • Jiaxin Pan, Libin Wang. TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. ProvSec 2011: 380-388.
    Springer Link [published version] Bibtex [bibtex]

  • Ronald Cramer, Dennis Hofheinz, Eike Kiltz. A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. Proceedings of IACR TCC 2010, 146--164 LNCS 5978 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Payman Mohassel, Adam O'Neill. Adaptive Trapdoor Functions and Chosen-Ciphertext Security. Proceedings of IACR EUROCRYPT 2010, 673-692 LNCS 6110 (2010).
    PDF [pdf]

  • Mark Manulis, Bertram Poettering, Gene Tsudik. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010.
    Springer Link [published version]

  • Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz. Efficient Hybrid Encryption from ID-Based Encryption. Designs, Codes and Cryptography 54(3): 205-240 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Encryption schemes secure against chosen-ciphertext selective opening attacks. Proceedings of IACR EUROCRYPT 2010, 381-402 LNCS 6110 (2010).
    PDF [pdf]

  • Eike Kiltz, Adam O'Neill, and Adam Smith. Instantiability of RSA-OAEP under Chosen-Plaintext Attack. Proceedings of IACR CRYPTO 2010, 295-313 LNCS 6223 (2010). Full version in preparation..


  • Eike Kiltz, Krzysztof Pietrzak. Leakage Resilient ElGamal Encryption. Proceedings of IACR ASIACRYPT 2010.
    PDF [pdf]

  • Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum. Leakage-Resilient Signatures. Proceedings of IACR TCC 2010, 343--360 LNCS 5978 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Mark Manulis, Benny Pinkas, Bertram Poettering. Privacy-Preserving Group Discovery with Linear Complexity. ACNS 2010.
    Springer Link [published version]

  • Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. ACNS 2010.
    Springer Link [published version]

  • Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup. Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. Proceedings of IACR PKC 2010, 279-295 LNCS 6056 (2010).
    PDF [pdf]

  • Mark Manulis, Bertram Poettering, Gene Tsudik. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. PETS 2010.
    Springer Link [published version]

  • Jiaxin Pan, Libin Wang, Changshe Ma. Security Enhancement and Modular Treatment towards Authenticated Key Exchange. ICICS 2010: 203-217.
    Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung. A New Randomness Extraction Paradigm for Hybrid Encryption. Proceedings of IACR EUROCRYPT 2009, pp. 590--609 LNCS 5479 (2009).
    PDF [pdf]

  • David Galindo, Eike Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Theoretical Computer Science. 410(47-49): 5093-5111 (2009).
    PDF [pdf]

  • Bertram Poettering. Incidence Geometry and its Applications in Cryptography. Master thesis in Mathematics (University of Hamburg, Mar 2009).


  • Eike Kiltz, Krzysztof Pietrzak. On the Security of Padding-Based Encryption Schemes (Or: Why we cannot prove OAEP secure in the Standard Model). Proceedings of IACR EUROCRYPT 2009, pp. 389--406 LNCS 5479 (2009).
    PDF [pdf]

  • Dennis Hofheinz, Eike Kiltz. The Group of Signed Quadratic Residues and Applications. Proceedings of IACR CRYPTO 2009, 637--653 LNCS 5677 (2009).
    PDF [pdf]

  • Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee and Moti Yung. The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure. Information Processing Letters, Volume 109, Issue 16, 31 July 2009, Pages 897-901.


  • David Cash, Eike Kiltz, Victor Shoup. The Twin Diffie-Hellman Problem and Applications. Journal of Cryptology, Volume 22, Issue 4 (2009), Page 470.
    Springer Link [published version]

  • Eike Kiltz, Yevgeniy Vahlis. CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. Proceedings of CT-RSA 2008. pp. 221--238 LNCS 4964 (2008). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. pp. 1-26, preprint. An extended version of this paper appeared in CT-RSA 2008 (with Y. Vahlis). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Michel Abdalla, Eike Kiltz, Gregory Neven. Generalized Key Delegation for Hierarchical Identity-Based Encryption. IET Information Security, Volume 2, Issue 3, pp. 67--78, September 2008.


  • Eike Kiltz, Gregory Neven. Identity-Based Signatures. IOS Press Cryptology and Information Security Series on Identity-Based Cryptography, Dec 2008.
    PDF [pdf] URL [url]

  • Ivan Damgaard, Dennis Hofheinz, Eike Kiltz, Rune Thorbek. Public-Key Encryption with Non-Interactive Opening. Proceedings of CT-RSA 2008. pp. 239--255 LNCS 4964 (2008).
    PDF [pdf]

  • Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier and Haixia Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Journal of Cryptology, Volume 21, Isuue 3, July 2008, pp. 350--391.
    Springer Link [published version]

  • Bertram Poettering. Very Long Baseline Interferometry (VLBI) on Longwave by Synchronization by Aid of Time Signals. Master thesis in Computer Science (University of Hamburg, Feb 2008).


  • Ronald Cramer, Eike Kiltz, C. Padró. A Note on Secure Computation of the Moore-Penrose Pseudo-Inverse and its Application to Secure Linear Algebra. Proceedings of IACR CRYPTO 2007, pp. 613--630 LNCS 4622 (2007).


  • Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan. Bounded CCA2-Secure Encryption. Proceedings of IACR ASIACRYPT 2007. (An earlier version appeared as eprint 2006/391).


  • Eike Kiltz. Chosen-Ciphertext Secure Key Encapsulation based on Hashed Gap Decisional Diffie-Hellman. Proceedings of IACR PKC 2007, pp. 282--297 LNCS 4450 (2007). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme. Cryptology ePrint Archive.
    PDF [pdf]

  • Mihir Bellare, Dennis Hofheinz, Eike Kiltz. On the No-Challenge-Decryption Condition in IND-CCA. Manuscript (2007).


  • Dennis Hofheinz, Eike Kiltz. Secure Hybrid Encryption from Weakened Key Encapsulation. Proceedings of IACR CRYPTO 2007, pp. 553--571 LNCS 4622 (2007). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Payman Mohassel, Enav Weinreb, Matt Franklin. Secure Linear Algebra Using Linearly Recurrent Sequences. Proceedings of IACR TCC 2007, pp. 291--310 LNCS 4392 (2007).
    PDF [pdf]

  • Ronald Cramer, Dennis Hofheinz, Eike Kiltz. A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security. manuscript. Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. Chosen-Ciphertext Security from Tag-Based Encryption. Proceedings of IACR TCC 2006, pp. 581--600 LNCS 3876 (2006).
    PDF [pdf]

  • David Galindo, Eike Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Proceedings of ACISP 2006, pp. 336--347 LNCS 4058 (2006). Full version available on Cryptology ePrint Archive. See also the journal version..
    PDF [pdf]

  • David Galindo and Javier Herranz and Eike Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. Proceedings of IACR ASIACRYPT 2006, pp. 178 -- 193 LNCS 4284 (2006). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. On the Limitations of the Spread of an IBE-to-PKE Transformation. Proceedings of IACR PKC 2006, pp. 274--289 LNCS 3958 (2006).
    PDF [pdf]

  • Eike Kiltz, Arne Winterhof. Polynomial Interpolation of Cryptographic Functions Related to the Diffie-Hellman and Discrete Logarithm Problem. Journal of Discrete Applied Mathematics, Special Issue on Coding and Cryptography, Volume 154, Issue 2 , 1 February 2006, pp. 326-336. (Journal version of a WCC 2003 paper.).


  • Javier Herranz, Dennis Hofheinz, Eike Kiltz. Some (In)Sufficient Conditions for Secure Hybrid Encryption. Information and Computation. Journal version available on Cryptology ePrint Archive.
    PDF [pdf]

  • David Galindo, Eike Kiltz. Threshold Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Proceedings of SCN 2006, pp. 173--185 LNCS 4116 (2006). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Ivan Damgaard, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft. Unconditionally Secure Constant-Rounds Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. Proceedings of IACR TCC 2006, pp. 285--304 LNCS 3876 (2006).
    PDF [pdf]

  • Eike Kiltz, Anton Mityagin, Saurabh Panjwani Barath Raghavan. Append-Only Signatures. Proceedings of ICALP 2005, pp. 435--445 LNCS 3580 (2005). © Springer-Verlag. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Gregor Leander, John Malone-Lee. Secure Computation of the Mean and Related Statistics. Proceedings of IACR TCC 2005, pp. 283--302 LNCS 3378 (2005). © IACR. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Hans Ulrich Simon. Threshold Circuit Lower Bounds on Cryptographic Functions. Journal of Computer and Systems Sciences, JCSS Volume 71, Issue 2, August 2005, pp. 185-212. Full version available on Cryptology ePrint Archive.


  • Eike Kiltz. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. pp. 1-22, manuscript. Cryptology ePrint Archive. This paper has been merged and was published at TCC 2006..
    PDF [pdf]

  • Eike Kiltz, Arne Winterhof. Lower Bounds on Weight and Degree of Bivariate Polynomials Related to the Diffie-Hellman Mapping. Bulletin of the AMS, vol. 69 (2004), pp. 305-315.


  • Eike Kiltz, John Malone-Lee. A General Construction of IND-CCA2 Secure Public Key Encryption. Proceedings of the Ninth IMA Conference on Cryptography and Coding, pp. 152--166. LNCS 2898 (2003). .
    URL [url]

  • Eike Kiltz, Hand Ulrich Simon. Complexity Theoretic Aspects of some Cryptographic Functions. Proceedings of the Ninth International Computing and Combinatorics Conference, COCOON 2003. pp. 294--303. LNCS 2697. © Springer-Verlag.
    URL [url]

  • Eike Kiltz. Complexity Theoretic Lower Bounds on Cryptographic Functions. Ruhr-Universität Bochum, Nov 2003.
    URL [url]

  • Eike Kiltz. On the Representation of Boolean Predicates of the Diffie-Hellman Function. Proceedings of the 20th International Symposium on Theoretical Aspects of Computer Science, STACS 2003. LNCS 2607.
    PDF [pdf] URL [url]

  • Eike Kiltz. A Primitive for Proving the Security of Every Bit and About Universal Hash Functions & Hard Core Bits. Proceedings of the 13th International Symposium on Fundamentals of Computation Theory, FCT 2001, LNCS 2138. © Springer-Verlag.
    PDF [pdf] URL [url]

  • Eike Kiltz. A Tool Box of Cryptographic Functions related to the Diffie-Hellman Function. Proceedings of the second International Conference on Cryptology in India, INDOCRYPT 2001. LNCS 2247. © Springer-Verlag.
    PDF [pdf] URL [url]

  • Eike Kiltz. Verfahren zur Überprüfung von Bitsicherheit in Kryptosystemen. Diplomarbeit Mathematik (in German), Ruhr-Universität Bochum, May 2000.


  • Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto. Chosen Ciphertext Security with Optimal Ciphertext Overhead. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E93-A No.1 pp.22-33.