Nils Fleischhacker

Cryptographer working in applied and theoretical cryptography. Currently Assistant Professor for Cryptography at Ruhr University Bochum.

  • Guaranteeing a Dishonest Party's Knowledge (Or: Setup Requirements for Deniable Authentication) Wed, Jan 1, 2025
  • Jackpot: Non-Interactive Aggregatable Lotteries Mon, Dec 9, 2024
  • Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT Mon, Dec 9, 2024
  • Invertible Bloom Lookup Tables With Less Memory and Randomness Tue, Apr 2, 2024
  • Chipmunk: Better Synchronized Multi Signatures From Lattices Sun, Nov 26, 2023
  • Interactive Non Malleable Codes Against Desynchronizing Attacks in the Multi Party Setting Tue, Jun 6, 2023
  • How to Compress Encrypted Data Sun, Apr 23, 2023
  • Squirrel: Efficient Synchronized Multi Signatures From Lattices Mon, Nov 7, 2022
  • Steganography Free Zero Knowledge Mon, Nov 7, 2022
  • Property Preserving Hash Functions for Hamming Distance From Standard Assumptions Mon, May 30, 2022
  • Robust Property Preserving Hash Functions for Hamming Distance and More Sun, Oct 17, 2021
  • On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments Thu, May 13, 2021
  • Feasibility and Infeasibility of Secure Computation With Malicious PUFs Wed, Jan 1, 2020
  • Interactive Non-Malleable Codes Sun, Dec 1, 2019
  • Arithmetic Garbling from Bilinear Maps Mon, Sep 23, 2019
  • On Tight Security Proofs for Schnorr Signatures Wed, Feb 6, 2019
  • On the Existence of Three Round Zero Knowledge Proofs Wed, May 2, 2018
  • Efficient Unlinkable Sanitizable Signatures From Signatures With Re-Randomizable Keys Tue, May 1, 2018
  • Minimal Assumptions in Cryptography Thu, Feb 9, 2017
  • Efficient Cryptographic Password Hardening Services From Partially Oblivious Commitments Mon, Oct 24, 2016
  • On Statistically Secure Obfuscation With Approximate Correctness Tue, Aug 16, 2016
  • Two Message Oblivious Evaluation of Cryptographic Functionalities Sun, Aug 14, 2016
  • Efficient Unlinkable Sanitizable Signatures From Signatures With Re-Randomizable Keys Sun, Mar 6, 2016
  • A Framework for Multi Factor Authentication and Key Exchange Tue, Dec 16, 2014
  • On Tight Security Proofs for Schnorr Signatures Sun, Dec 7, 2014
  • Feasibility and Infeasibility of Secure Computation With Malicious PUFs Sun, Aug 17, 2014
  • Limitations of the Meta Reduction Technique: The Case of Schnorr Signatures Sun, May 26, 2013
  • Pseudorandom Signatures Wed, May 8, 2013
  • Limitations of the Meta Reduction Technique: The Case of Schnorr Signatures Tue, Sep 25, 2012
  • Group Signatures: Authentication With Privacy Fri, Aug 10, 2012
  • SDF - Solar-Aware Distributed Flow in Wireless Sensor Networks Tue, Oct 4, 2011
  • Distributed Flow in Solar Powered Sensor Networks Wed, Sep 1, 2010