default search action
Doreen Riepel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Doreen Riepel, Marloes Venema, Tanya Verma:
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra. CCS 2024: 4628-4642 - [c13]Daniel Collins, Doreen Riepel, Si An Oliver Tran:
On the Tight Security of the Double Ratchet. CCS 2024: 4747-4761 - [c12]Jiaxin Pan, Doreen Riepel, Runzhi Zeng:
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation. EUROCRYPT (6) 2024: 59-89 - [c11]Jonas Meers, Doreen Riepel:
CCA Secure Updatable Encryption from Non-mappable Group Actions. PQCrypto (1) 2024: 137-169 - [i18]Jiaxin Pan, Doreen Riepel, Runzhi Zeng:
Key Exchange with Tight (Full) Forward Secrecy via Key Confirmation. IACR Cryptol. ePrint Arch. 2024: 361 (2024) - [i17]Jonas Meers, Doreen Riepel:
CCA Secure Updatable Encryption from Non-Mappable Group Actions. IACR Cryptol. ePrint Arch. 2024: 499 (2024) - [i16]Mihir Bellare, Doreen Riepel, Laura Shea:
Highly-Effective Backdoors for Hash Functions and Beyond. IACR Cryptol. ePrint Arch. 2024: 536 (2024) - [i15]Mihir Bellare, Doreen Riepel, Stefano Tessaro, Yizhao Zhang:
Count Corruptions, Not Users: Improved Tightness for Signatures, Encryption and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2024: 1258 (2024) - [i14]Doreen Riepel, Marloes Venema, Tanya Verma:
ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra. IACR Cryptol. ePrint Arch. 2024: 1352 (2024) - [i13]Mihir Bellare, Rishabh Ranjan, Doreen Riepel, Ali Aldakheel:
The Concrete Security of Two-Party Computation: Simple Definitions, and Tight Proofs for PSI and OPRFs. IACR Cryptol. ePrint Arch. 2024: 1476 (2024) - [i12]Daniel Collins, Doreen Riepel, Si An Oliver Tran:
On the Tight Security of the Double Ratchet. IACR Cryptol. ePrint Arch. 2024: 1625 (2024) - 2023
- [b1]Doreen Riepel:
Tightly-secure authenticated key exchange. Ruhr University Bochum, Germany, 2023 - [c10]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-user CDH Problems and the Concrete Security of NAXOS and HMQV. CT-RSA 2023: 645-671 - [c9]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. Public Key Cryptography (1) 2023: 406-435 - [c8]Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck:
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. USENIX Security Symposium 2023: 5109-5126 - [p1]Doreen Riepel:
Protokolle für den Authentifizierten Schlüsselaustausch mit Strikten Sicherheitsschranken. Ausgezeichnete Informatikdissertationen 2023: 251-260 - [i11]Thorsten Eisenhofer, Erwin Quiring, Jonas Möller, Doreen Riepel, Thorsten Holz, Konrad Rieck:
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. CoRR abs/2303.14443 (2023) - [i10]Eike Kiltz, Jiaxin Pan, Doreen Riepel, Magnus Ringerud:
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV. IACR Cryptol. ePrint Arch. 2023: 115 (2023) - [i9]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Generic Models for Group Actions. IACR Cryptol. ePrint Arch. 2023: 186 (2023) - 2022
- [c7]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. ASIACRYPT (2) 2022: 36-66 - [c6]Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler:
Strongly Anonymous Ratcheted Key Exchange. ASIACRYPT (3) 2022: 119-150 - [c5]Doreen Riepel, Hoeteck Wee:
FABEO: Fast Attribute-Based Encryption with Optimal Security. CCS 2022: 2491-2504 - [c4]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. CRYPTO (2) 2022: 699-728 - [d3]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Zenodo, 2022 - [i8]Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, Nicolas Papernot:
Verifiable and Provably Secure Machine Unlearning. CoRR abs/2210.09126 (2022) - [i7]Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel:
Password-Authenticated Key Exchange from Group Actions. IACR Cryptol. ePrint Arch. 2022: 770 (2022) - [i6]Benjamin Dowling, Eduard Hauck, Doreen Riepel, Paul Rösler:
Strongly Anonymous Ratcheted Key Exchange. IACR Cryptol. ePrint Arch. 2022: 1187 (2022) - [i5]Julien Duman, Dominik Hartmann, Eike Kiltz, Sabrina Kunzweiler, Jonas Lehmann, Doreen Riepel:
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM. IACR Cryptol. ePrint Arch. 2022: 1230 (2022) - [i4]Doreen Riepel, Hoeteck Wee:
FABEO: Fast Attribute-Based Encryption with Optimal Security. IACR Cryptol. ePrint Arch. 2022: 1415 (2022) - 2021
- [c3]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. CRYPTO (4) 2021: 670-700 - [c2]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. EUROCRYPT (1) 2021: 87-116 - [c1]Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. EUROCRYPT (1) 2021: 117-146 - [d2]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Zenodo, 2021 - [i3]Shuai Han, Tibor Jager, Eike Kiltz, Shengli Liu, Jiaxin Pan, Doreen Riepel, Sven Schäge:
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model. IACR Cryptol. ePrint Arch. 2021: 863 (2021) - 2020
- [d1]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard - Supplementary Material. Zenodo, 2020 - [i2]Tibor Jager, Eike Kiltz, Doreen Riepel, Sven Schäge:
Tightly-Secure Authenticated Key Exchange, Revisited. IACR Cryptol. ePrint Arch. 2020: 1279 (2020) - [i1]Joël Alwen, Bruno Blanchet, Eduard Hauck, Eike Kiltz, Benjamin Lipp, Doreen Riepel:
Analysing the HPKE Standard. IACR Cryptol. ePrint Arch. 2020: 1499 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint