What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mark Manulis
Google Scholar
ORCID:
0000-0002-1512-9670
53
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
Distributed Asynchronous Remote Key Generation.
Mark Manulis
Hugo Nartz
2025
conf/asiaccs
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility.
Jia Liu
Mark Manulis
2024
conf/ccs
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption.
Long Meng
Liqun Chen
Yangguang Tian
Mark Manulis
2024
conf/uss
FEASE: Fast and Expressive Asymmetric Searchable Encryption.
Long Meng
Liqun Chen
Yangguang Tian
Mark Manulis
Suhui Liu
2024
conf/eurocrypt
Fully Homomorphic Encryption Beyond IND-CCA1 Security: Integrity Through Verifiability.
Mark Manulis
Jérôme Nguyen
2023
conf/acns
Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems.
Nick Frymann
Daniel Gardham
Mark Manulis
Hugo Nartz
2023
conf/eurosp
Asynchronous Remote Key Generation for Post-Quantum Cryptosystems from Lattices.
Nick Frymann
Daniel Gardham
Mark Manulis
2022
conf/acns
Revocable Hierarchical Attribute-Based Signatures from Lattices.
Daniel Gardham
Mark Manulis
2022
conf/csr2
ICT in Healthcare: the role of IoT and the SECANT solution.
M. Caballero
Dimitris Kavallieros
Arnolnt Spyros
A. Tavernarakisv
Athanasios Tziouvaras
Stefano Bonacina
K. Chandrarmouli
M. Coroiu
L. Chen
T. Dounia
Ioannis Giannoulakis
N. Gligoric
Emmanouil Kafetzakis
T. Kasig
Vaios Koumaras
T. Krousarlis
K. Lapidaki
A. Markakis
S. Marin
Mark Manulis
Sofia-Anna Menesidou
Sokratis Nifakos
L. Meng
S. Mhiri
M. Nati
K. Ntafloukas
D. Oniga
Dimitrios Papamartzivanos
Spyros Papastergiou
K. Sanchez
Christos Sakkas
K. Stelliou
L. Trujillo
Theodora Tsikrika
E. Venegas
Stefanos Vrochidis
D. Xydias
2022
conf/esorics
Unlinkable Delegation of WebAuthn Credentials.
Nick Frymann
Daniel Gardham
Mark Manulis
2020
conf/ccs
Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn.
Nick Frymann
Daniel Gardham
Franziskus Kiefer
Emil Lundberg
Mark Manulis
Dain Nilsson
2020
conf/acns
Biometric-Authenticated Searchable Encryption.
Daniel Gardham
Mark Manulis
Constantin Catalin Dragan
2020
conf/esorics
An Interoperable Architecture for Usable Password-Less Authentication.
Matthew Casey
Mark Manulis
Christopher J. P. Newton
Robin Savage
Helen Treharne
2019
conf/acns
pRate: Anonymous Star Rating with Rating Secrecy.
Jia Liu
Mark Manulis
2019
conf/acns
Hierarchical Attribute-Based Signatures: Short Keys and Optimal Signature Length.
Daniel Gardham
Mark Manulis
2019
conf/esorics
Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics.
Juan E. Rubio
Mark Manulis
Cristina Alcaraz
Javier López
2018
conf/esorics
Bootstrapping Online Trust: Timeline Activity Proofs.
Constantin Catalin Dragan
Mark Manulis
2018
conf/cans
Hierarchical Attribute-Based Signatures.
Constantin Catalin Dragan
Daniel Gardham
Mark Manulis
2016
conf/ccs
Blind Password Registration for Verifier-based PAKE.
Franziskus Kiefer
Mark Manulis
2014
conf/acns
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange.
Franziskus Kiefer
Mark Manulis
2014
conf/esorics
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE.
Franziskus Kiefer
Mark Manulis
2014
conf/cans
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Felix Günther
Mark Manulis
Andreas Peter
2013
journals/istr
Security and privacy for digital ecosystems.
Ioannis G. Askoxylakis
Mark Manulis
Joachim Posegga
2013
conf/ccs
Pseudorandom signatures.
Nils Fleischhacker
Felix Günther
Franziskus Kiefer
Mark Manulis
Bertram Poettering
2013
conf/acisp
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Yang Wang
Mark Manulis
Man Ho Au
Willy Susilo
2013
conf/cans
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions.
Veronika Kuchta
Mark Manulis
2012
conf/acisp
Fully Private Revocable Predicate Encryption.
Juan Manuel González Nieto
Mark Manulis
Dongdong Sun
2012
conf/acisp
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
Atsushi Fujioka
Mark Manulis
Koutarou Suzuki
Berkant Ustaoglu
2011
conf/ccs
Practical affiliation-hiding authentication from improved polynomial interpolation.
Mark Manulis
Bertram Poettering
2011
conf/fc
Cryptographic Treatment of Private User Profiles.
Felix Günther
Mark Manulis
Thorsten Strufe
2011
conf/acns
Private Discovery of Common Social Contacts.
Emiliano De Cristofaro
Mark Manulis
Bertram Poettering
2011
conf/asiacrypt
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Marc Fischlin
Benoît Libert
Mark Manulis
2011
conf/cans
Group Signature with Constant Revocation Costs for Signers and Verifiers.
Chun-I Fan
Ruei-Hau Hsu
Mark Manulis
2010
conf/acns
Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Christina Brzuska
Heike Busch
Özgür Dagdelen
Marc Fischlin
Martin Franz
Stefan Katzenbeisser
Mark Manulis
Cristina Onete
Andreas Peter
Bertram Poettering
Dominique Schröder
2010
conf/acns
Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Mark Manulis
Bertram Poettering
Gene Tsudik
2010
conf/acns
Privacy-Preserving Group Discovery with Linear Complexity.
Mark Manulis
Benny Pinkas
Bertram Poettering
2010
conf/pkc
Confidential Signatures and Deterministic Signcryption.
Alexander W. Dent
Marc Fischlin
Mark Manulis
Martijn Stam
Dominique Schröder
2010
conf/africacrypt
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
David Galindo
Benoît Libert
Marc Fischlin
Georg Fuchsbauer
Anja Lehmann
Mark Manulis
Dominique Schröder
2010
conf/africacrypt
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.
Michel Abdalla
Céline Chevalier
Mark Manulis
David Pointcheval
2009
conf/ccs
Authenticated wireless roaming via tunnels: making mobile guests feel at home.
Mark Manulis
Damien Leroy
François Koeune
Olivier Bonaventure
Jean-Jacques Quisquater
2009
conf/acns
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.
Mark Manulis
2009
conf/icisc
Generic One Round Group Key Exchange in the Standard Model.
M. Choudary Gorantla
Colin Boyd
Juan Manuel González Nieto
Mark Manulis
2009
conf/icisc
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
Mark Manulis
Koutarou Suzuki
Berkant Ustaoglu
2009
conf/wisa
Securing Remote Access Inside Wireless Mesh Networks.
Mark Manulis
2009
conf/cans
Fully Robust Tree-Diffie-Hellman Group Key Exchange.
Timo Brecher
Emmanuel Bresson
Mark Manulis
2008
conf/ccs
Securing group key exchange against strong corruptions.
Emmanuel Bresson
Mark Manulis
2008
conf/ccs
Provably secure browser-based user-aware mutual authentication over TLS.
Sebastian Gajek
Mark Manulis
Ahmad-Reza Sadeghi
Jörg Schwenk
2008
conf/acisp
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
Sebastian Gajek
Mark Manulis
Jörg Schwenk
2008
conf/provsec
Universally Composable Security Analysis of TLS.
Sebastian Gajek
Mark Manulis
Olivier Pereira
Ahmad-Reza Sadeghi
Jörg Schwenk
2008
conf/esorics
A Browser-Based Kerberos Authentication Scheme.
Sebastian Gajek
Tibor Jager
Mark Manulis
Jörg Schwenk
2007
conf/fc
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Liqun Chen
Alberto N. Escalante
Hans Löhr
Mark Manulis
Ahmad-Reza Sadeghi
2007
conf/iwsec
On Security Models and Compilers for Group Key Exchange Protocols.
Emmanuel Bresson
Mark Manulis
Jörg Schwenk
2006
conf/ccs
Democratic group signatures: on an example of joint ventures.
Mark Manulis
Coauthors
A. Markakis
(1)
A. Tavernarakisv
(1)
Ahmad-Reza Sadeghi
(3)
Alberto N. Escalante
(1)
Alexander W. Dent
(1)
Andreas Peter
(2)
Anja Lehmann
(1)
Arnolnt Spyros
(1)
Athanasios Tziouvaras
(1)
Atsushi Fujioka
(1)
Benny Pinkas
(1)
Benoît Libert
(2)
Berkant Ustaoglu
(2)
Bertram Poettering
(6)
Céline Chevalier
(1)
Christina Brzuska
(1)
Christopher J. P. Newton
(1)
Christos Sakkas
(1)
Chun-I Fan
(1)
Colin Boyd
(1)
Constantin Catalin Dragan
(3)
Cristina Alcaraz
(1)
Cristina Onete
(1)
D. Oniga
(1)
D. Xydias
(1)
Dain Nilsson
(1)
Damien Leroy
(1)
Daniel Gardham
(8)
David Galindo
(1)
David Pointcheval
(1)
Dimitrios Papamartzivanos
(1)
Dimitris Kavallieros
(1)
Dominique Schröder
(3)
Dongdong Sun
(1)
E. Venegas
(1)
Emil Lundberg
(1)
Emiliano De Cristofaro
(1)
Emmanouil Kafetzakis
(1)
Emmanuel Bresson
(3)
Felix Günther
(3)
François Koeune
(1)
Franziskus Kiefer
(5)
Gene Tsudik
(1)
Georg Fuchsbauer
(1)
Hans Löhr
(1)
Heike Busch
(1)
Helen Treharne
(1)
Hugo Nartz
(2)
Ioannis G. Askoxylakis
(1)
Ioannis Giannoulakis
(1)
Javier López
(1)
Jean-Jacques Quisquater
(1)
Jérôme Nguyen
(1)
Jia Liu
(1)
Jia Liu
(1)
Joachim Posegga
(1)
Jörg Schwenk
(5)
Juan E. Rubio
(1)
Juan Manuel González Nieto
(2)
K. Chandrarmouli
(1)
K. Lapidaki
(1)
K. Ntafloukas
(1)
K. Sanchez
(1)
K. Stelliou
(1)
Koutarou Suzuki
(2)
L. Chen
(1)
L. Meng
(1)
L. Trujillo
(1)
Liqun Chen
(3)
Long Meng
(2)
M. Caballero
(1)
M. Choudary Gorantla
(1)
M. Coroiu
(1)
M. Nati
(1)
Man Ho Au
(1)
Marc Fischlin
(4)
Mark Manulis
(53)
Martijn Stam
(1)
Martin Franz
(1)
Matthew Casey
(1)
Michel Abdalla
(1)
N. Gligoric
(1)
Nick Frymann
(4)
Nils Fleischhacker
(1)
Olivier Bonaventure
(1)
Olivier Pereira
(1)
Özgür Dagdelen
(1)
Robin Savage
(1)
Ruei-Hau Hsu
(1)
S. Marin
(1)
S. Mhiri
(1)
Sebastian Gajek
(4)
Sofia-Anna Menesidou
(1)
Sokratis Nifakos
(1)
Spyros Papastergiou
(1)
Stefan Katzenbeisser
(1)
Stefano Bonacina
(1)
Stefanos Vrochidis
(1)
Suhui Liu
(1)
T. Dounia
(1)
T. Kasig
(1)
T. Krousarlis
(1)
Theodora Tsikrika
(1)
Thorsten Strufe
(1)
Tibor Jager
(1)
Timo Brecher
(1)
Vaios Koumaras
(1)
Veronika Kuchta
(1)
Willy Susilo
(1)
Yang Wang
(1)
Yangguang Tian
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to