What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ron Steinfeld
Google Scholar
ORCID:
0000-0003-1745-4183
76
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Constant Latency and Finality for Dynamically Available DAG.
Hans Schmiedel
Runchao Han
Qiang Tang
Ron Steinfeld
Jiangshan Yu
2025
conf/provsec
Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs.
Xinyu Zhang
Qishuang Fu
Ron Steinfeld
Joseph K. Liu
Tsz Hon Yuen
Man Ho Au
2024
journals/tifs
Quantum-Safe HIBE: Does It Cost a Latte?
Raymond K. Zhao
Sarah McCarthy
Ron Steinfeld
Amin Sakzad
Máire O'Neill
2024
conf/ccs
LUNA: Quasi-Optimally Succinct Designated-Verifier Zero-Knowledge Arguments from Lattices.
Ron Steinfeld
Amin Sakzad
Muhammed F. Esgin
Veronika Kuchta
Mert Yassi
Raymond K. Zhao
2024
conf/acisp
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
Xinyu Zhang
Ron Steinfeld
Joseph K. Liu
Muhammed F. Esgin
Dongxi Liu
Sushmita Ruj
2024
conf/crypto
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
Xinyu Zhang
Ron Steinfeld
Muhammed F. Esgin
Joseph K. Liu
Dongxi Liu
Sushmita Ruj
2024
conf/ccsw-ws
Lattice-Based Cryptography: From Protocol Design to Fast and Secure Implementation.
Ron Steinfeld
2024
conf/eurocrypt
Plover: Masking-Friendly Hash-and-Sign Lattice Signatures.
Muhammed F. Esgin
Thomas Espitau
Guilhem Niot
Thomas Prest
Amin Sakzad
Ron Steinfeld
2023
conf/crypto
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs.
Muhammed F. Esgin
Ron Steinfeld
Dongxi Liu
Sushmita Ruj
2023
conf/asiapkc
Post-Quantum Zero-Knowledge Proofs and Applications.
Ron Steinfeld
2023
conf/asiaccs
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Muhammed F. Esgin
Oguzhan Ersoy
Veronika Kuchta
Julian Loss
Amin Sakzad
Ron Steinfeld
Xiangwen Yang
Raymond K. Zhao
2022
conf/acisp
Garrison: A Novel Watchtower Scheme for Bitcoin.
Arash Mirzaei
Amin Sakzad
Jiangshan Yu
Ron Steinfeld
2022
conf/acisp
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security.
Xiaohui Ding
Muhammed F. Esgin
Amin Sakzad
Ron Steinfeld
2022
conf/sp
MatRiCT<sup>+</sup>: More Efficient Post-Quantum Private Blockchain Payments.
Muhammed F. Esgin
Ron Steinfeld
Raymond K. Zhao
2022
conf/acns
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives.
Maxime Buser
Joseph K. Liu
Ron Steinfeld
Amin Sakzad
2022
conf/pkc
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications.
Muhammed F. Esgin
Ron Steinfeld
Raymond K. Zhao
2021
conf/acisp
Transparency or Anonymity Leak: Monero Mining Pools Data Publication.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
2021
conf/fc
Practical Post-quantum Few-Time Verifiable Random Function with Applications to Algorand.
Muhammed F. Esgin
Veronika Kuchta
Amin Sakzad
Ron Steinfeld
Zhenfei Zhang
Shifeng Sun
Shumo Chu
2021
conf/fc
FPPW: A Fair and Privacy Preserving Watchtower for Bitcoin.
Arash Mirzaei
Amin Sakzad
Jiangshan Yu
Ron Steinfeld
2021
conf/esorics
Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy.
Shabnam Kasra Kermanshahi
Rafael Dowsley
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Surya Nepal
Xun Yi
2021
conf/ndss
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Shifeng Sun
Ron Steinfeld
Shangqi Lai
Xingliang Yuan
Amin Sakzad
Joseph K. Liu
Surya Nepal
Dawu Gu
2021
conf/pkc
On the Integer Polynomial Learning with Errors Problem.
Julien Devevey
Amin Sakzad
Damien Stehlé
Ron Steinfeld
2020
conf/pkc
MPSign: A Signature from Small-Secret Middle-Product Learning with Errors.
Shi Bai
Dipayan Das
Ryo Hiromasa
Miruna Rosca
Amin Sakzad
Damien Stehlé
Ron Steinfeld
Zhenfei Zhang
2020
conf/pkc
Public-Key Puncturable Encryption: Modular and Compact Constructions.
Shifeng Sun
Amin Sakzad
Ron Steinfeld
Joseph K. Liu
Dawu Gu
2020
conf/eurocrypt
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
Veronika Kuchta
Amin Sakzad
Damien Stehlé
Ron Steinfeld
Shifeng Sun
2020
conf/sacrypt
Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments.
Veronika Kuchta
Amin Sakzad
Ron Steinfeld
Joseph K. Liu
2019
conf/ccs
Multi-Writer Searchable Encryption: An LWE-based Realization and Implementation.
Lei Xu
Xingliang Yuan
Ron Steinfeld
Cong Wang
Chungen Xu
2019
conf/ccs
MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol.
Muhammed F. Esgin
Raymond K. Zhao
Ron Steinfeld
Joseph K. Liu
Dongxi Liu
2019
conf/ccs
On The Unforkability of Monero.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
Jiangshan Yu
2019
conf/acisp
Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets.
Wilson Abel Alberto Torres
Veronika Kuchta
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Jacob Cheng
2019
conf/acisp
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
2019
conf/crypto
Lattice-Based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications.
Muhammed F. Esgin
Ron Steinfeld
Joseph K. Liu
Dongxi Liu
2019
conf/acns
Short Lattice-Based One-out-of-Many Proofs and Applications to Ring Signatures.
Muhammed F. Esgin
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Dongxi Liu
2019
conf/esorics
DGM: A Dynamic and Revocable Group Merkle Signature.
Maxime Buser
Joseph K. Liu
Ron Steinfeld
Amin Sakzad
Shifeng Sun
2019
conf/esorics
Generic Multi-keyword Ranked Search on Encrypted Cloud Data.
Shabnam Kasra Kermanshahi
Joseph K. Liu
Ron Steinfeld
Surya Nepal
2019
conf/cans
Senarai: A Sustainable Public Blockchain-Based Permanent Storage Protocol.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
Limerlina
2019
conf/cans
Designing Smart Contract for Electronic Document Taxation.
Dimaz Ankaa Wijaya
Joseph K. Liu
Ron Steinfeld
Dongxi Liu
Fengkie Junis
Dony Ariadi Suwarsono
2018
journals/joc
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather than the Statistical Distance.
Shi Bai
Tancrède Lepoint
Adeline Roux-Langlois
Amin Sakzad
Damien Stehlé
Ron Steinfeld
2018
conf/ccs
Practical Backward-Secure Searchable Encryption from Symmetric Puncturable Encryption.
Shifeng Sun
Xingliang Yuan
Joseph K. Liu
Ron Steinfeld
Amin Sakzad
Viet Vo
Surya Nepal
2018
conf/ccs
Result Pattern Hiding Searchable Encryption for Conjunctive Queries.
Shangqi Lai
Sikhar Patranabis
Amin Sakzad
Joseph K. Liu
Debdeep Mukhopadhyay
Ron Steinfeld
Shifeng Sun
Dongxi Liu
Cong Zuo
2018
conf/acisp
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
Wilson Abel Alberto Torres
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Veronika Kuchta
Nandita Bhattacharjee
Man Ho Au
Jacob Cheng
2017
conf/acisp
Multi-user Cloud-Based Secure Keyword Search.
Shabnam Kasra Kermanshahi
Joseph K. Liu
Ron Steinfeld
2017
conf/crypto
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
Benoît Libert
Amin Sakzad
Damien Stehlé
Ron Steinfeld
2017
conf/crypto
Middle-Product Learning with Errors.
Miruna Rosca
Amin Sakzad
Damien Stehlé
Ron Steinfeld
2016
conf/esorics
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries.
Shifeng Sun
Joseph K. Liu
Amin Sakzad
Ron Steinfeld
Tsz Hon Yuen
2015
journals/tifs
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices.
Hassan Jameel Asghar
Ron Steinfeld
Shujun Li
Mohamed Ali Kâafar
Josef Pieprzyk
2015
conf/fse
Rotational Cryptanalysis of ARX Revisited.
Dmitry Khovratovich
Ivica Nikolic
Josef Pieprzyk
Przemyslaw Sokolowski
Ron Steinfeld
2015
conf/asiacrypt
Improved Security Proofs in Lattice-Based Cryptography: Using the Rényi Divergence Rather Than the Statistical Distance.
Shi Bai
Adeline Langlois
Tancrède Lepoint
Damien Stehlé
Ron Steinfeld
2014
conf/crypto
Hardness of k-LWE and Applications in Traitor Tracing.
San Ling
Duong Hieu Phan
Damien Stehlé
Ron Steinfeld
2014
conf/eurocrypt
GGHLite: More Efficient Multilinear Maps from Ideal Lattices.
Adeline Langlois
Damien Stehlé
Ron Steinfeld
2013
conf/ndss
Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks.
Hassan Jameel Asghar
Shujun Li
Ron Steinfeld
Josef Pieprzyk
2013
conf/cans
Truncated Differential Analysis of Reduced-Round LBlock.
Sareh Emami
Cameron McDonald
Josef Pieprzyk
Ron Steinfeld
2012
journals/joc
Graph Coloring Applied to Secure Computation in Non-Abelian Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Xiaoming Sun
Christophe Tartary
Huaxiong Wang
Andrew Chi-Chih Yao
2012
conf/pkc
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model.
Ron Steinfeld
San Ling
Josef Pieprzyk
Christophe Tartary
Huaxiong Wang
2011
conf/acisp
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster).
Reza Sepahi
Ron Steinfeld
Josef Pieprzyk
2011
conf/eurocrypt
Making NTRU as Secure as Worst-Case Problems over Ideal Lattices.
Damien Stehlé
Ron Steinfeld
2010
conf/icisc
Known and Chosen Key Differential Distinguishers for Block Ciphers.
Ivica Nikolic
Josef Pieprzyk
Przemyslaw Sokolowski
Ron Steinfeld
2010
conf/asiacrypt
Faster Fully Homomorphic Encryption.
Damien Stehlé
Ron Steinfeld
2009
conf/icisc
Efficient Fuzzy Matching and Intersection on Private Datasets.
Qingsong Ye
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2009
conf/asiacrypt
Efficient Public Key Encryption Based on Ideal Lattices.
Damien Stehlé
Ron Steinfeld
Keisuke Tanaka
Keita Xagawa
2008
conf/fse
Cryptanalysis of LASH.
Ron Steinfeld
Scott Contini
Krystian Matusiewicz
Josef Pieprzyk
Jian Guo
San Ling
Huaxiong Wang
2008
conf/cans
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.
Hung-Min Sun
Mu-En Wu
Ron Steinfeld
Jian Guo
Huaxiong Wang
2007
journals/joc
Formal Proofs for the Security of Signcryption.
Joonsang Baek
Ron Steinfeld
Yuliang Zheng
2007
conf/crypto
On Secure Multi-party Computation in Black-Box Groups.
Yvo Desmedt
Josef Pieprzyk
Ron Steinfeld
Huaxiong Wang
2007
conf/ctrsa
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/pkc
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2006
conf/eurocrypt
VSH, an Efficient and Provable Collision-Resistant Hash Function.
Scott Contini
Arjen K. Lenstra
Ron Steinfeld
2006
conf/asiacrypt
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.
Ron Steinfeld
Josef Pieprzyk
Huaxiong Wang
2005
conf/pkc
Converse Results to the Wiener Attack on RSA.
Ron Steinfeld
Scott Contini
Huaxiong Wang
Josef Pieprzyk
2004
conf/pkc
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
Ron Steinfeld
Huaxiong Wang
Josef Pieprzyk
2004
conf/asiacrypt
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.
Ron Steinfeld
Huaxiong Wang
Josef Pieprzyk
2003
conf/asiacrypt
Universal Designated-Verifier Signatures.
Ron Steinfeld
Laurence Bull
Huaxiong Wang
Josef Pieprzyk
2002
conf/acisp
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes.
Ron Steinfeld
Joonsang Baek
Yuliang Zheng
2002
conf/pkc
Formal Proofs for the Security of Signcryption.
Joonsang Baek
Ron Steinfeld
Yuliang Zheng
2001
conf/icisc
Content Extraction Signatures.
Ron Steinfeld
Laurence Bull
Yuliang Zheng
2001
conf/ctrsa
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits.
Ron Steinfeld
Yuliang Zheng
Coauthors
Adeline Langlois
(2)
Adeline Roux-Langlois
(1)
Amin Sakzad
(26)
Andrew Chi-Chih Yao
(1)
Arash Mirzaei
(2)
Arjen K. Lenstra
(1)
Benoît Libert
(1)
Cameron McDonald
(1)
Christophe Tartary
(2)
Chungen Xu
(1)
Cong Wang
(1)
Cong Zuo
(1)
Damien Stehlé
(12)
Dawu Gu
(2)
Debdeep Mukhopadhyay
(1)
Dimaz Ankaa Wijaya
(5)
Dipayan Das
(1)
Dmitry Khovratovich
(1)
Dongxi Liu
(12)
Dony Ariadi Suwarsono
(1)
Duong Hieu Phan
(1)
Fengkie Junis
(1)
Guilhem Niot
(1)
Hans Schmiedel
(1)
Hassan Jameel Asghar
(2)
Huaxiong Wang
(13)
Hung-Min Sun
(1)
Ivica Nikolic
(2)
Jacob Cheng
(2)
Jian Guo
(2)
Jiangshan Yu
(4)
Joonsang Baek
(3)
Josef Pieprzyk
(18)
Joseph K. Liu
(24)
Julian Loss
(1)
Julien Devevey
(1)
Keisuke Tanaka
(1)
Keita Xagawa
(1)
Krystian Matusiewicz
(1)
Laurence Bull
(2)
Lei Xu
(1)
Limerlina
(1)
Máire O'Neill
(1)
Man Ho Au
(2)
Maxime Buser
(2)
Mert Yassi
(1)
Miruna Rosca
(2)
Mohamed Ali Kâafar
(1)
Mu-En Wu
(1)
Muhammed F. Esgin
(13)
Nandita Bhattacharjee
(1)
Oguzhan Ersoy
(1)
Przemyslaw Sokolowski
(2)
Qiang Tang
(1)
Qingsong Ye
(1)
Qishuang Fu
(1)
Rafael Dowsley
(1)
Raymond K. Zhao
(6)
Reza Sepahi
(1)
Ron Steinfeld
(76)
Runchao Han
(1)
Ryo Hiromasa
(1)
San Ling
(3)
Sarah McCarthy
(1)
Sareh Emami
(1)
Scott Contini
(3)
Shabnam Kasra Kermanshahi
(3)
Shangqi Lai
(2)
Shi Bai
(3)
Shifeng Sun
(8)
Shujun Li
(2)
Shumo Chu
(1)
Sikhar Patranabis
(1)
Surya Nepal
(4)
Sushmita Ruj
(3)
Tancrède Lepoint
(2)
Thomas Espitau
(1)
Thomas Prest
(1)
Tsz Hon Yuen
(2)
Veronika Kuchta
(7)
Viet Vo
(1)
Wilson Abel Alberto Torres
(2)
Xiangwen Yang
(1)
Xiaohui Ding
(1)
Xiaoming Sun
(1)
Xingliang Yuan
(3)
Xinyu Zhang
(3)
Xun Yi
(1)
Yuliang Zheng
(5)
Yvo Desmedt
(2)
Zhenfei Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to