What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Jens Ernstberger
Google Scholar
11
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
ORIGO: Proving Provenance of Sensitive Data with Constant Communication.
Jens Ernstberger
Jan Lauinger
Yinnan Wu
Arthur Gervais
Sebastian Steinhorst
2025
journals/popets
Janus: Fast Privacy-Preserving Data Provenance For TLS.
Jan Lauinger
Jens Ernstberger
Andreas Finkenzeller
Sebastian Steinhorst
2025
conf/sp
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs.
Jens Ernstberger
Chengru Zhang
Luca Ciprian
Philipp Jovanovic
Sebastian Steinhorst
2024
conf/uss
SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs.
Stefanos Chaliasos
Jens Ernstberger
David Theodore
David Wong
Mohammad Jahanara
Benjamin Livshits
2024
conf/icbc2
zkGen: Policy-to-Circuit Transpiler.
Jan Lauinger
Jens Ernstberger
Sebastian Steinhorst
2024
conf/icbc2
Portal: Time-Bound and Replay-Resistant Zero-Knowledge Proofs for Single Sign-On.
Jan Lauinger
Serhat Bezmez
Jens Ernstberger
Sebastian Steinhorst
2023
conf/fc
Mitigating Decentralized Finance Liquidations with Reversible Call Options.
Kaihua Qin
Jens Ernstberger
Liyi Zhou
Philipp Jovanovic
Arthur Gervais
2023
conf/sp
SoK: Decentralized Finance (DeFi) Attacks.
Liyi Zhou
Xihan Xiong
Jens Ernstberger
Stefanos Chaliasos
Zhipeng Wang
Ye Wang
Kaihua Qin
Roger Wattenhofer
Dawn Song
Arthur Gervais
2023
conf/eurosp
SoK: Data Sovereignty.
Jens Ernstberger
Jan Lauinger
Fatima Elsheimy
Liyi Zhou
Sebastian Steinhorst
Ran Canetti
Andrew Miller
Arthur Gervais
Dawn Song
2023
conf/icbc2
Anonymous Domain Ownership.
Jan Lauinger
Jens Ernstberger
Sebastian Steinhorst
2021
conf/icbc2
A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management.
Jan Lauinger
Jens Ernstberger
Emanuel Regnath
Mohammad Hamad
Sebastian Steinhorst
Coauthors
Andreas Finkenzeller
(1)
Andrew Miller
(1)
Arthur Gervais
(4)
Benjamin Livshits
(1)
Chengru Zhang
(1)
David Theodore
(1)
David Wong
(1)
Dawn Song
(2)
Emanuel Regnath
(1)
Fatima Elsheimy
(1)
Jan Lauinger
(7)
Jens Ernstberger
(11)
Kaihua Qin
(2)
Liyi Zhou
(3)
Luca Ciprian
(1)
Mohammad Hamad
(1)
Mohammad Jahanara
(1)
Philipp Jovanovic
(2)
Ran Canetti
(1)
Roger Wattenhofer
(1)
Sebastian Steinhorst
(8)
Serhat Bezmez
(1)
Stefanos Chaliasos
(2)
Xihan Xiong
(1)
Ye Wang
(1)
Yinnan Wu
(1)
Zhipeng Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to