Publikationsliste für
Stephan Krenn
als Autorin / Autor bzw. wesentlich beteiligte Person

46 Datensätze (2015 - 2021)

In der nachstehenden Liste werden Präsentationen mit Tagungsband doppelt - als Druckpublikation und als Präsentation - ausgegeben. Die Gesamtanzahl der unten aufgelisteten Datensätze ist daher im Allgemeinen größer als die oben angeführte Anzahl.


Bücher und Buch-Herausgaben

3 Datensätze:
  1. M. Friedewald, M. Önen, E. Lievens, S. Krenn, S. Fricker (Hrg.):
    "Privacy and Identity Management. Data for Better Living: AI and Privacy";
    Springer International Publishing, Cham, Schweiz, 2020, ISBN: 978-3-030-42503-6; 480 S.

  2. S. Krenn, E. Kosta, J. Pierson, D. Slamanig, S. Fischer-Hübner (Hrg.):
    "Privacy and Identity Management - Fairness, Accountability, and Transparency in the Age of Big Data";
    Springer, Cham, Switzerland, Cham, 2019, ISBN: 978-3-030-16743-1; 1 S.

  3. S. Krenn, H. Shulman, S. Vaudenay (Hrg.):
    "Cryptology and Network Security - CANS 2020";
    Springer International Publishing, Cham, Schweiz, 2020, ISBN: 978-3-030-65410-8; 634 S.


Artikel in wissenschaftlichen Zeitschriften

8 Datensätze:
  1. S. Krenn, J. Bieliauskaite, A. Karyda, E. Rios, G. Suciu:
    "TRUSTEE - Data Privacy and Cloud Security Cluster Europe";
    ERCIM News, 114 (2018), S. 37.

  2. S. Krenn, T. Lorünser, R. Kammerer:
    "High Performance Software Defined Storage for the Cloud";
    ERCIM News, 119 (2019), S. 42 - 43.

  3. S. Krenn, T. Lorünser, C. Striecks:
    "Engineering Cryptography for Security and Privacy in the Cloud";
    ERCIM News, 113 (2018), S. 53 - 55.

  4. S. Krenn, K. Pietrzak, A. Wadia, D. Wichs:
    "A Counterexample to the Chain Rule for Conditional HILL Entropy";
    computational complexity, 25 (2016), 3; S. 567 - 605.

  5. S. Krenn, H. Pöhls, K. Samelin, D. Slamanig:
    "Fully Invisible Protean Signatures Schemes";
    IET Information Security, 14 (2020), S. 266 - 285.

  6. T. Lorünser, S. Krenn, C. Striecks, T. Länger:
    "Agile Cryptographic Solutions for the Cloud";
    e&i elektrotechnik und informationstechnik, 134 (2017), 7; S. 364 - 369.

  7. N. Notario, S. Krenn, B. Zwattendorfer, F. Hörandner:
    "CREDENTIAL: Secure Cloud Identity Wallet";
    ERCIM News, 106 (2016), S. 11 - 12.

  8. B. Zwattendorfer, S. Krenn, T. Lorünser:
    "Secure and Privacy-Preserving Identity Management in the Cloud";
    ERCIM News, Januar (2016), 104; S. 44 - 45.


Buchbeiträge

1 Datensatz:
  1. S. Krenn, P. Hamm, J. Pettersson:
    "Secure and Privacy-Preserving Identity and Access Management in CREDENTIAL";
    in: "Challenges in Cybersecurity and Privacy - the European Research Landscape", River Publishers, Gistrup, 2018, ISBN: 978-87-7022-088-0, S. 271 - 284.


Beiträge in Tagungsbänden

27 Datensätze:
  1. F. Baldimtsi, J. Camenisch, L. Hanzlik, S. Krenn, A. Lehmann, G. Neven:
    "Recovering Lost Device-Bound Credentials";
    Vortrag: Applied Cryptography and Network Security - ACNS 2015, New York, USA; 02.06.2015 - 05.06.2015; in: "ACNS 2015", Springer, Heidelberg (2015), ISBN: 978-3319281650; S. 307 - 327.

  2. M.T. Beck, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures";
    Vortrag: Australasian Conference on Information Security and Privacy - ACISP 2017, Auckland, Neuseeland; 03.07.2017 - 05.07.2017; in: "ACISP 2017, Part I", J. Pieprzyk, S. Suriadi (Hrg.); Springer Verlag, LNCS 10342 (2017), ISBN: 978-3-319-60055-0; S. 437 - 452.

  3. M.T. Beck, S. Krenn, F.S. Preiss, K. Samelin:
    "Practical Signing-Right Revocation";
    Vortrag: Trust and Trustworthy Computing - TRUST 2016, Vienna; 29.08.2016 - 30.08.2016; in: "TRUST 2016", Springer, Heidelberg (2016), ISBN: 978-3-319-45571-6; S. 21 - 39.

  4. J. Bobolz, F. Eidens, S. Krenn, D. Slamanig, C. Striecks:
    "Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection";
    Vortrag: 15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020, Virtual Event; 05.10.2020 - 09.10.2020; in: "15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020", Association for Computing Machinery, New York, United States (2020), ISBN: 978-1-4503-6750-9; S. 319 - 333.

  5. J. Camenisch, R. Enderlein, S. Krenn, R. Küsters, D. Rausch:
    "Universal Composition with Responsive Environments";
    Vortrag: Advances in Cryptology - ASIACRYPT 2016, Hanoi, Vietnam; 04.12.2016 - 08.12.2016; in: "Advances in Cryptology - ASIACRYPT 2016 Part II", J. Cheon, T. Takagi (Hrg.); Springer, LNCS 10032 (2016), ISBN: 978-3-662-53889-0; S. 807 - 840.

  6. J. Camenisch, S. Krenn, R. Küsters, D. Rausch:
    "iUC: Flexible Universal Composability Made Simple";
    in: "Advances in Cryptology - ASIACRYPT 2019", LNCS 11923; S. Galbraith, S. Moriai (Hrg.); Springer, Cham, Switerland, 2019, ISBN: 978-3-030-34618-8, S. 191 - 221.

  7. J. Camenisch, S. Krenn, A. Lehmann, G. Mikkelsen, G. Neven, M. Pedersen:
    "Formal Treatment of Privacy-Enhancing Credential Systems";
    Vortrag: Selected Areas in Cryptography - SAC 2015, Sackville,NB, Canada; 12.08.2015 - 14.08.2015; in: "SAC 2015", Springer, Heidelberg (2015), ISBN: 978-3-319-31300-9; S. 3 - 24.

  8. P. Chiaro, S. Fischer-Hübner, T. Groß, S. Krenn, T. Lorünser, A. Martínez Garcí, A. Migliavacca, K. Rannenberg, D. Slamanig, C. Striecks, A. Zanini:
    "Secure and Privacy-Friendly Storage and Data Processing in the Cloud";
    in: "Privacy and Identity Management. The Smart Revolution", 526; M. Hansen, E. Kosta, I. Nai-Fovino, S. Fischer-Hübner (Hrg.); Springer, Springer International Publishing, Cham, Schweiz, 2018, ISBN: 978-3-319-92924-8, S. 153 - 169.

  9. D. Demirel, S. Krenn, T. Lorünser, G. Traverso:
    "Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System";
    Vortrag: ARES 2016, Salzburg; 31.08.2016 - 02.09.2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; S. 88 - 97.

  10. D. Derler, S. Krenn, T. Lorünser, S. Ramacher, D. Slamanig, C. Striecks:
    "Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications";
    Vortrag: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil; 25.03.2018 - 29.03.2018; in: "21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018", Springer, 10769 (2018), ISBN: 978-3-319-76577-8; S. 219 - 250.

  11. D. Derler, S. Krenn, K. Samelin, D. Slamanig:
    "Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions";
    Vortrag: 12th Conference on Security and Cryptography for Networks - SCN 2020, Virtual Event; 14.09.2020 - 16.09.2020; in: "12th Conference on Security and Cryptography for Networks - SCN 2020", Springer, Lecture Notes in Computer Science, 12238 (2020), ISBN: 978-3-030-57989-0; S. 427 - 447.

  12. D. Derler, S. Krenn, D. Slamanig:
    "Signer- Anonymous Designated- Verifier Redactable Signatures for Cloud-Based Data Sharing";
    Vortrag: Cryptology and Network Security- CANS 2016, Mailand, Italien; 14.11.2016 - 16.11.2016; in: "Cryptology and Network Security- CANS 2016", S. Foresti, G. Persiano (Hrg.); Springer Verlag, LNCS 10052 (2016), ISBN: 978-3-319-48964-3; S. 211 - 227.

  13. U. Haböck, S. Krenn:
    "Breaking and Fixing Anonymous Credentials for the Cloud";
    in: "Cryptology and Network Security- CANS 2019", 11829; Springer, Cham, Switzerland, 2019, ISBN: 978-3-030-31577-1, S. 249 - 269.

  14. A. Happe, S. Krenn, T. Lorünser:
    "Malicious Clients in Distributed Secret Sharing Based Storage Networks";
    Vortrag: Security Protocols XXIV - SPW 2016, Brno, Czech Republic; 07.04.2016 - 08.04.2016; in: "Security Protocols XXVI - SPW 2016", J. Anderson, V. Matyàs, B. Christianson, F. Stajano (Hrg.); Springer Verlag, (2016), ISBN: 978-3-319-62032-9; S. 206 - 214.

  15. F. Hörander, S. Krenn, A. Migliavacca, F. Thiemer, B. Zwattendorfer:
    "CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing";
    Vortrag: SECPID@ARES 2016, Salzburg; 31.08.2016 - 02.09.2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; S. 742 - 749.

  16. F. Karegar, C. Striecks, S. Krenn, F. Hörandner, T. Lorünser, S. Fischer-Hübner:
    "Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider";
    Vortrag: Privacy and Identity Management. IFIP Summer School 2016, Karlstad, Sweden; 21.08.2016 - 26.08.2016; in: "Privacy and Identity Management 2016", Springer Verlag, IFIP Advances in Information and Communication Technology 498 (2016), ISBN: 978-3-319-55782-3; S. 76 - 91.

  17. K. Koch, S. Krenn, D. Pellegrino, S. Ramacher:
    "Privacy-preserving Analytics for Data Merkets using MPC";
    Vortrag: IFIP Summer School on Privacy and Identity Management, Maribor, Slovenia; 20.09.2020 - 23.09.2020; in: "Privacy and Identity Management. Privacy and Identity 2020. IFIP Advances in Information and Communication Technology", Springer, 619/Cham, Switzerland (2020), ISBN: 978-3-030-72464-1; S. 226 - 246.

  18. A. Kostopoulos, E. Sfakianakis, I. Chochliouros, J. Pettersson, S. Krenn, W. Tesfay, A. Migliavacca, F. Hörandner:
    "Towards the Adoption of Secure Cloud Identity Services";
    Vortrag: SECPID@ARES 2017, Reggio Calabria, Italien; 29.08.2017 - 01.09.2017; in: "SECPID@ARES 2017", ACM, (2017), ISBN: 978-1-4503-5257-4; S. 90:1 - 90:7.

  19. S. Krenn, F. Benhamouda, V. Lyubashevsky, K. Pietrzak:
    "Efficient Zero-Knowledge Proofs for Commitments from Learning wiht Errors over Rings";
    Vortrag: European Symposium on Research in Computer Security - ESORICS 2015, Wien; 23.09.2015 - 25.09.2015; in: "ESORICS 2015", Springer, LNCS 9326 (2015), ISBN: 978-3-319-24173-9; S. ++.

  20. S. Krenn, T. Lorünser, S. Salzer, C. Striecks:
    "Towards Attribute-Based Credentials in the Cloud";
    Vortrag: Cryptology and Network Security - CANS 2017, Hongkong; 29.11.2016 - 01.12.2016; in: "Cryptology and Network Security - CANS 2017", S. Capkun, S. Chow (Hrg.); Springer Verlag, (2016), S. 166 - 187.

  21. S. Krenn, T. Lorünser, C. Striecks:
    "Batch-verifiable Secret Sharing with Unconditional Privacy";
    Vortrag: International Conference on Information Systems Security and Privacy - ICISSP 2017, Porto, Portugal; 19.02.2017 - 21.02.2017; in: "ICISSP 2017", SciTePress, (2017), ISBN: 978-989-758-209-7; S. 303 - 311.

  22. S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications";
    Vortrag: 10th International Conference on Cryptology in Africa - AFRICACRYPT 2018, Marrakesh, Morocco; 07.05.2018 - 09.05.2018; in: "10th International Conference on Cryptology in Africa - AFRICACRYPT 2018", Springer, 10831 (2018), ISBN: 978-3-319-89338-9; S. 11 - 32.

  23. S. Krenn, K. Samelin, D. Sommer:
    "Stronger Security for Sanitizable Signatures";
    Vortrag: International Workshop on Data Privacy, Wien; 21.09.2015 - 22.09.2015; in: "DPM and QASA 2015", Springer, LNCS volume 9481 (2015), ISBN: 978-3-319-29883-2; S. 100 - 117.

  24. S. Krenn, K. Samelin, C. Striecks:
    "Practical Group-Signatures with Privacy-Friendly Openings";
    in: "Availability, Reliability and Security - ARES 2019", ACM, New York, 2019, ISBN: 978-1-4503-7164-3, S. 1 - 10.

  25. S. Rührup, S. Krenn:
    "Towards Privacy in Geographic Message Dissemination for Connected Vehicles";
    in: "International Conference on Connected Vehicles and Expo - ICCVE 2019", IEEE, USA, 2019, ISBN: 978-1-7281-0143-9, S. 17 - 22.

  26. D. Slamanig, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin:
    "Chameleon-Hashes with Ephemeral Trapdoors -- And Applications to Invisible Sanitizable Signatures";
    Vortrag: 20th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2017, Amsterdam, Niederlande; 28.03.2017 - 31.03.2017; in: "PKC 2017, Part II", S. Fehr (Hrg.); Springer, LNCS 10175 (2017), ISBN: 978-3662543870; S. 152 - 182.

  27. D. Slamanig, S. Krenn, C. Pöhls, K. Samelin:
    "Protean Signature Schemes";
    Vortrag: 17th International Conference on Cryptology And Network Security (CANS 2018), Naples; 30.09.2018 - 03.10.2018; in: "17th International Conference on Cryptology And Network Security (CANS 2018)", Springer, Lecture Notes in Computer Science, vol. 11124 (2018), ISBN: 978-3-030-00434-7; S. 256 - 276.


Vorträge und Posterpräsentationen auf Tagungen

28 Datensätze:
  1. F. Baldimtsi, J. Camenisch, L. Hanzlik, S. Krenn, A. Lehmann, G. Neven:
    "Recovering Lost Device-Bound Credentials";
    Vortrag: Applied Cryptography and Network Security - ACNS 2015, New York, USA; 02.06.2015 - 05.06.2015; in: "ACNS 2015", Springer, Heidelberg (2015), ISBN: 978-3319281650; S. 307 - 327.

  2. M.T. Beck, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures";
    Vortrag: Australasian Conference on Information Security and Privacy - ACISP 2017, Auckland, Neuseeland; 03.07.2017 - 05.07.2017; in: "ACISP 2017, Part I", J. Pieprzyk, S. Suriadi (Hrg.); Springer Verlag, LNCS 10342 (2017), ISBN: 978-3-319-60055-0; S. 437 - 452.

  3. M.T. Beck, S. Krenn, F.S. Preiss, K. Samelin:
    "Practical Signing-Right Revocation";
    Vortrag: Trust and Trustworthy Computing - TRUST 2016, Vienna; 29.08.2016 - 30.08.2016; in: "TRUST 2016", Springer, Heidelberg (2016), ISBN: 978-3-319-45571-6; S. 21 - 39.

  4. J. Bobolz, F. Eidens, S. Krenn, D. Slamanig, C. Striecks:
    "Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection";
    Vortrag: 15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020, Virtual Event; 05.10.2020 - 09.10.2020; in: "15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020", Association for Computing Machinery, New York, United States (2020), ISBN: 978-1-4503-6750-9; S. 319 - 333.

  5. J. Camenisch, R. Enderlein, S. Krenn, R. Küsters, D. Rausch:
    "Universal Composition with Responsive Environments";
    Vortrag: Advances in Cryptology - ASIACRYPT 2016, Hanoi, Vietnam; 04.12.2016 - 08.12.2016; in: "Advances in Cryptology - ASIACRYPT 2016 Part II", J. Cheon, T. Takagi (Hrg.); Springer, LNCS 10032 (2016), ISBN: 978-3-662-53889-0; S. 807 - 840.

  6. J. Camenisch, S. Krenn, A. Lehmann, G. Mikkelsen, G. Neven, M. Pedersen:
    "Formal Treatment of Privacy-Enhancing Credential Systems";
    Vortrag: Selected Areas in Cryptography - SAC 2015, Sackville,NB, Canada; 12.08.2015 - 14.08.2015; in: "SAC 2015", Springer, Heidelberg (2015), ISBN: 978-3-319-31300-9; S. 3 - 24.

  7. D. Demirel, S. Krenn, T. Lorünser, G. Traverso:
    "Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System";
    Vortrag: ARES 2016, Salzburg; 31.08.2016 - 02.09.2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; S. 88 - 97.

  8. D. Derler, S. Krenn, T. Lorünser, S. Ramacher, D. Slamanig, C. Striecks:
    "Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications";
    Vortrag: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil; 25.03.2018 - 29.03.2018; in: "21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018", Springer, 10769 (2018), ISBN: 978-3-319-76577-8; S. 219 - 250.

  9. D. Derler, S. Krenn, K. Samelin, D. Slamanig:
    "Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions";
    Vortrag: 12th Conference on Security and Cryptography for Networks - SCN 2020, Virtual Event; 14.09.2020 - 16.09.2020; in: "12th Conference on Security and Cryptography for Networks - SCN 2020", Springer, Lecture Notes in Computer Science, 12238 (2020), ISBN: 978-3-030-57989-0; S. 427 - 447.

  10. D. Derler, S. Krenn, D. Slamanig:
    "Signer- Anonymous Designated- Verifier Redactable Signatures for Cloud-Based Data Sharing";
    Vortrag: Cryptology and Network Security- CANS 2016, Mailand, Italien; 14.11.2016 - 16.11.2016; in: "Cryptology and Network Security- CANS 2016", S. Foresti, G. Persiano (Hrg.); Springer Verlag, LNCS 10052 (2016), ISBN: 978-3-319-48964-3; S. 211 - 227.

  11. A. Happe, S. Krenn, T. Lorünser:
    "Malicious Clients in Distributed Secret Sharing Based Storage Networks";
    Vortrag: Security Protocols XXIV - SPW 2016, Brno, Czech Republic; 07.04.2016 - 08.04.2016; in: "Security Protocols XXVI - SPW 2016", J. Anderson, V. Matyàs, B. Christianson, F. Stajano (Hrg.); Springer Verlag, (2016), ISBN: 978-3-319-62032-9; S. 206 - 214.

  12. F. Hörander, S. Krenn, A. Migliavacca, F. Thiemer, B. Zwattendorfer:
    "CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing";
    Vortrag: SECPID@ARES 2016, Salzburg; 31.08.2016 - 02.09.2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; S. 742 - 749.

  13. F. Karegar, C. Striecks, S. Krenn, F. Hörandner, T. Lorünser, S. Fischer-Hübner:
    "Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider";
    Vortrag: Privacy and Identity Management. IFIP Summer School 2016, Karlstad, Sweden; 21.08.2016 - 26.08.2016; in: "Privacy and Identity Management 2016", Springer Verlag, IFIP Advances in Information and Communication Technology 498 (2016), ISBN: 978-3-319-55782-3; S. 76 - 91.

  14. K. Koch, S. Krenn, D. Pellegrino, S. Ramacher:
    "Privacy-preserving Analytics for Data Merkets using MPC";
    Vortrag: IFIP Summer School on Privacy and Identity Management, Maribor, Slovenia; 20.09.2020 - 23.09.2020; in: "Privacy and Identity Management. Privacy and Identity 2020. IFIP Advances in Information and Communication Technology", Springer, 619/Cham, Switzerland (2020), ISBN: 978-3-030-72464-1; S. 226 - 246.

  15. A. Kostopoulos, E. Sfakianakis, I. Chochliouros, J. Pettersson, S. Krenn, W. Tesfay, A. Migliavacca, F. Hörandner:
    "Towards the Adoption of Secure Cloud Identity Services";
    Vortrag: SECPID@ARES 2017, Reggio Calabria, Italien; 29.08.2017 - 01.09.2017; in: "SECPID@ARES 2017", ACM, (2017), ISBN: 978-1-4503-5257-4; S. 90:1 - 90:7.

  16. S. Krenn:
    "Anonymous Credential Systems - Theory & Practice";
    Vortrag: Privacy Enhancing Technologies and Security Solutions for the Smart Grid User Domain - PRETSELS, Puch bei Hallein (eingeladen); 21.09.2015 - 22.09.2015.

  17. S. Krenn:
    "CyberSec4Europe Aiming to safeguard values through excellence in cybersecurity";
    Vortrag: Plattform Industrie 4.0- Workshop Security & Safety, Wien (virtuell) (eingeladen); 30.10.2020.

  18. S. Krenn:
    "European digital sovereignty and global competitiveness by secure mobile working and smart data sharing: Part II";
    Vortrag: ECSEL Austria Conference 2021 "Sustainable Society: Move Data, not People" - Positioning Europe, Wien (eingeladen); 18.10.2021.

  19. S. Krenn:
    "New Generation of Cryptographic Security - Beyond Basic Encryption and Signatures";
    Vortrag: Building a Cyber Resilient Society in South-Eastern Europe- Advanced Training Course, RACVIAC - Centre for Security Cooperation, Zagreb, Kroatien (eingeladen); 17.10.2016 - 21.10.2016.

  20. S. Krenn:
    "Secure Multi Party Computation and Privacy-Preserving Data Markets";
    Vortrag: FITCE Congress for ICT Professionals, Wien (eingeladen); 29.09.2021 - 30.09.2021.

  21. S. Krenn:
    "Standardisierung von Post-Quantum Kryptographie";
    Vortrag: CSP Cyber Sicherheit Plattform Österreich Workshop, Wien (eingeladen); 12.11.2021.

  22. S. Krenn, F. Benhamouda, V. Lyubashevsky, K. Pietrzak:
    "Efficient Zero-Knowledge Proofs for Commitments from Learning wiht Errors over Rings";
    Vortrag: European Symposium on Research in Computer Security - ESORICS 2015, Wien; 23.09.2015 - 25.09.2015; in: "ESORICS 2015", Springer, LNCS 9326 (2015), ISBN: 978-3-319-24173-9; S. ++.

  23. S. Krenn, T. Lorünser, S. Salzer, C. Striecks:
    "Towards Attribute-Based Credentials in the Cloud";
    Vortrag: Cryptology and Network Security - CANS 2017, Hongkong; 29.11.2016 - 01.12.2016; in: "Cryptology and Network Security - CANS 2017", S. Capkun, S. Chow (Hrg.); Springer Verlag, (2016), S. 166 - 187.

  24. S. Krenn, T. Lorünser, C. Striecks:
    "Batch-verifiable Secret Sharing with Unconditional Privacy";
    Vortrag: International Conference on Information Systems Security and Privacy - ICISSP 2017, Porto, Portugal; 19.02.2017 - 21.02.2017; in: "ICISSP 2017", SciTePress, (2017), ISBN: 978-989-758-209-7; S. 303 - 311.

  25. S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications";
    Vortrag: 10th International Conference on Cryptology in Africa - AFRICACRYPT 2018, Marrakesh, Morocco; 07.05.2018 - 09.05.2018; in: "10th International Conference on Cryptology in Africa - AFRICACRYPT 2018", Springer, 10831 (2018), ISBN: 978-3-319-89338-9; S. 11 - 32.

  26. S. Krenn, K. Samelin, D. Sommer:
    "Stronger Security for Sanitizable Signatures";
    Vortrag: International Workshop on Data Privacy, Wien; 21.09.2015 - 22.09.2015; in: "DPM and QASA 2015", Springer, LNCS volume 9481 (2015), ISBN: 978-3-319-29883-2; S. 100 - 117.

  27. D. Slamanig, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin:
    "Chameleon-Hashes with Ephemeral Trapdoors -- And Applications to Invisible Sanitizable Signatures";
    Vortrag: 20th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2017, Amsterdam, Niederlande; 28.03.2017 - 31.03.2017; in: "PKC 2017, Part II", S. Fehr (Hrg.); Springer, LNCS 10175 (2017), ISBN: 978-3662543870; S. 152 - 182.

  28. D. Slamanig, S. Krenn, C. Pöhls, K. Samelin:
    "Protean Signature Schemes";
    Vortrag: 17th International Conference on Cryptology And Network Security (CANS 2018), Naples; 30.09.2018 - 03.10.2018; in: "17th International Conference on Cryptology And Network Security (CANS 2018)", Springer, Lecture Notes in Computer Science, vol. 11124 (2018), ISBN: 978-3-030-00434-7; S. 256 - 276.


Diplomarbeiten und Masterthesen

1 Datensatz:
  1. D. Köhle:
    "ABC for Privacy Implementing a Framework for Privacy-Preserving Authentication in the Cloud";
    Betreuer/in(nen): S. Krenn, U. Haböck; FH Campus Wien, 2018; Abschlussprüfung: 21.09.2018.