What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mark Simkin
Google Scholar
ORCID:
0000-0002-7325-5261
35
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
OCash: Fully Anonymous Payments Between Blockchain Light Clients.
Adam Blatchley Hansen
Jesper Buus Nielsen
Mark Simkin
2024
journals/cic
Foundations of Data Availability Sampling.
Mathias Hall-Andersen
Mark Simkin
Benedikt Wagner
2024
conf/crypto
FRIDA: Data Availability Sampling from FRI.
Mathias Hall-Andersen
Mark Simkin
Benedikt Wagner
2024
conf/asiacrypt
Jackpot: Non-interactive Aggregatable Lotteries.
Nils Fleischhacker
Mathias Hall-Andersen
Mark Simkin
Benedikt Wagner
2024
conf/asiacrypt
Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT.
Nils Fleischhacker
Mathias Hall-Andersen
Mark Simkin
2024
conf/tcc
The Power of NAPs: - Compressing OR-Proofs via Collision-Resistant Hashing.
Katharina Boudgoust
Mark Simkin
2023
conf/latincrypt
Stronger Lower Bounds for Leakage-Resilient Secret Sharing.
Charlotte Hoffmann
Mark Simkin
2023
conf/ccs
Chipmunk: Better Synchronized Multi-Signatures from Lattices.
Nils Fleischhacker
Gottfried Herold
Mark Simkin
Zhenfei Zhang
2023
conf/ccs
Ramen: Souper Fast Three-Party Computation for RAM Programs.
Lennart Braun
Mahak Pancholi
Rahul Rachuri
Mark Simkin
2023
conf/pkc
Threshold Private Set Intersection with Better Communication Complexity.
Satrajit Ghosh
Mark Simkin
2023
conf/eurocrypt
How to Compress Encrypted Data.
Nils Fleischhacker
Kasper Green Larsen
Mark Simkin
2022
conf/ccs
Caulk: Lookup Arguments in Sublinear Time.
Arantxa Zapico
Vitalik Buterin
Dmitry Khovratovich
Mary Maller
Anca Nitulescu
Mark Simkin
2022
conf/ccs
Laconic Private Set-Intersection From Pairings.
Diego F. Aranha
Chuanwei Lin
Claudio Orlandi
Mark Simkin
2022
conf/ccs
Squirrel: Efficient Synchronized Multi-Signatures from Lattices.
Nils Fleischhacker
Mark Simkin
Zhenfei Zhang
2022
conf/eurocrypt
Property-Preserving Hash Functions for Hamming Distance from Standard Assumptions.
Nils Fleischhacker
Kasper Green Larsen
Mark Simkin
2021
conf/pkc
On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments.
Nils Fleischhacker
Mark Simkin
2021
conf/eurocrypt
Robust Property-Preserving Hash Functions for Hamming Distance and More.
Nils Fleischhacker
Mark Simkin
2021
conf/eurocrypt
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.
Gianluca Brian
Antonio Faonio
Maciej Obremski
João Ribeiro
Mark Simkin
Maciej Skórski
Daniele Venturi
2020
conf/crypto
Black-Box Transformations from Passive to Covert Security with Public Verifiability.
Ivan Damgård
Claudio Orlandi
Mark Simkin
2020
conf/crypto
Non-malleable Secret Sharing Against Bounded Joint-Tampering Attacks in the Plain Model.
Gianluca Brian
Antonio Faonio
Maciej Obremski
Mark Simkin
Daniele Venturi
2020
conf/eurocrypt
Lower Bounds for Leakage-Resilient Secret Sharing.
Jesper Buus Nielsen
Mark Simkin
2020
conf/tcc
Lower Bounds for Multi-server Oblivious RAMs.
Kasper Green Larsen
Mark Simkin
Kevin Yeo
2019
conf/crypto
The Communication Complexity of Threshold Private Set Intersection.
Satrajit Ghosh
Mark Simkin
2019
conf/crypto
Stronger Leakage-Resilient and Non-Malleable Secret Sharing Schemes for General Access Structures.
Divesh Aggarwal
Ivan Damgård
Jesper Buus Nielsen
Maciej Obremski
Erick Purwanto
João Ribeiro
Mark Simkin
2019
conf/asiacrypt
Perfectly Secure Oblivious RAM with Sublinear Bandwidth Overhead.
Michael A. Raskin
Mark Simkin
2018
journals/popets
Functional Credentials.
Dominic Deuber
Matteo Maffei
Giulio Malavolta
Max Rabkin
Dominique Schröder
Mark Simkin
2018
conf/crypto
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings.
Ivan Damgård
Claudio Orlandi
Mark Simkin
2018
conf/acns
Continuously Non-malleable Codes with Split-State Refresh.
Antonio Faonio
Jesper Buus Nielsen
Mark Simkin
Daniele Venturi
2018
conf/pkc
Compact Zero-Knowledge Proofs of Small Hamming Weight.
Ivan Damgård
Ji Luo
Sabine Oechsner
Peter Scholl
Mark Simkin
2016
conf/pkc
Nearly Optimal Verifiable Data Streaming.
Johannes Krupp
Dominique Schröder
Mark Simkin
Dario Fiore
Giuseppe Ateniese
Stefan Nürnberger
2016
conf/pkc
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys.
Nils Fleischhacker
Johannes Krupp
Giulio Malavolta
Jonas Schneider
Dominique Schröder
Mark Simkin
2015
conf/fc
VeriStream - A Framework for Verifiable Data Streaming.
Dominique Schröder
Mark Simkin
2014
conf/ccs
POSTER: Enhancing Security and Privacy with Google Glass.
Johannes Krupp
Dominique Schröder
Mark Simkin
2014
conf/acns
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP.
Michael Backes
Rainer W. Gerling
Sebastian Gerling
Stefan Nürnberger
Dominique Schröder
Mark Simkin
2014
conf/esorics
Ubic: Bridging the Gap between Digital Cryptography and the Physical World.
Mark Simkin
Dominique Schröder
Andreas Bulling
Mario Fritz
Coauthors
Adam Blatchley Hansen
(1)
Anca Nitulescu
(1)
Andreas Bulling
(1)
Antonio Faonio
(3)
Arantxa Zapico
(1)
Benedikt Wagner
(3)
Charlotte Hoffmann
(1)
Chuanwei Lin
(1)
Claudio Orlandi
(3)
Daniele Venturi
(3)
Dario Fiore
(1)
Diego F. Aranha
(1)
Divesh Aggarwal
(1)
Dmitry Khovratovich
(1)
Dominic Deuber
(1)
Dominique Schröder
(7)
Erick Purwanto
(1)
Gianluca Brian
(2)
Giulio Malavolta
(2)
Giuseppe Ateniese
(1)
Gottfried Herold
(1)
Ivan Damgård
(4)
Jesper Buus Nielsen
(4)
Ji Luo
(1)
João Ribeiro
(2)
Johannes Krupp
(3)
Jonas Schneider
(1)
Kasper Green Larsen
(3)
Katharina Boudgoust
(1)
Kevin Yeo
(1)
Lennart Braun
(1)
Maciej Obremski
(3)
Maciej Skórski
(1)
Mahak Pancholi
(1)
Mario Fritz
(1)
Mark Simkin
(35)
Mary Maller
(1)
Mathias Hall-Andersen
(4)
Matteo Maffei
(1)
Max Rabkin
(1)
Michael A. Raskin
(1)
Michael Backes
(1)
Nils Fleischhacker
(9)
Peter Scholl
(1)
Rahul Rachuri
(1)
Rainer W. Gerling
(1)
Sabine Oechsner
(1)
Satrajit Ghosh
(2)
Sebastian Gerling
(1)
Stefan Nürnberger
(2)
Vitalik Buterin
(1)
Zhenfei Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to