Publication list for
Stephan Krenn
as author or essentially involved person

46 records (2015 - 2021)

The following list contains presentations with proceedings-entry twice, once as printed contributions, and once as presentations. In general, the total number of records given below is therefore greater than the number shown above.


Books and Book Editorships

3 records:
  1. M. Friedewald, M. Önen, E. Lievens, S. Krenn, S. Fricker (ed.):
    "Privacy and Identity Management. Data for Better Living: AI and Privacy";
    Springer International Publishing, Cham, Schweiz, 2020, ISBN: 978-3-030-42503-6; 480 pages.

  2. S. Krenn, E. Kosta, J. Pierson, D. Slamanig, S. Fischer-Hübner (ed.):
    "Privacy and Identity Management - Fairness, Accountability, and Transparency in the Age of Big Data";
    Springer, Cham, Switzerland, Cham, 2019, ISBN: 978-3-030-16743-1; 1 pages.

  3. S. Krenn, H. Shulman, S. Vaudenay (ed.):
    "Cryptology and Network Security - CANS 2020";
    Springer International Publishing, Cham, Schweiz, 2020, ISBN: 978-3-030-65410-8; 634 pages.


Publications in Scientific Journals

8 records:
  1. S. Krenn, J. Bieliauskaite, A. Karyda, E. Rios, G. Suciu:
    "TRUSTEE - Data Privacy and Cloud Security Cluster Europe";
    ERCIM News, 114 (2018), 37.

  2. S. Krenn, T. Lorünser, R. Kammerer:
    "High Performance Software Defined Storage for the Cloud";
    ERCIM News, 119 (2019), 42 - 43.

  3. S. Krenn, T. Lorünser, C. Striecks:
    "Engineering Cryptography for Security and Privacy in the Cloud";
    ERCIM News, 113 (2018), 53 - 55.

  4. S. Krenn, K. Pietrzak, A. Wadia, D. Wichs:
    "A Counterexample to the Chain Rule for Conditional HILL Entropy";
    computational complexity, 25 (2016), 3; 567 - 605.

  5. S. Krenn, H. Pöhls, K. Samelin, D. Slamanig:
    "Fully Invisible Protean Signatures Schemes";
    IET Information Security, 14 (2020), 266 - 285.

  6. T. Lorünser, S. Krenn, C. Striecks, T. Länger:
    "Agile Cryptographic Solutions for the Cloud";
    e&i elektrotechnik und informationstechnik, 134 (2017), 7; 364 - 369.

  7. N. Notario, S. Krenn, B. Zwattendorfer, F. Hörandner:
    "CREDENTIAL: Secure Cloud Identity Wallet";
    ERCIM News, 106 (2016), 11 - 12.

  8. B. Zwattendorfer, S. Krenn, T. Lorünser:
    "Secure and Privacy-Preserving Identity Management in the Cloud";
    ERCIM News, Januar (2016), 104; 44 - 45.


Contributions to Books

1 record:
  1. S. Krenn, P. Hamm, J. Pettersson:
    "Secure and Privacy-Preserving Identity and Access Management in CREDENTIAL";
    in: "Challenges in Cybersecurity and Privacy - the European Research Landscape", River Publishers, Gistrup, 2018, ISBN: 978-87-7022-088-0, 271 - 284.


Contributions to Proceedings

27 records:
  1. F. Baldimtsi, J. Camenisch, L. Hanzlik, S. Krenn, A. Lehmann, G. Neven:
    "Recovering Lost Device-Bound Credentials";
    Talk: Applied Cryptography and Network Security - ACNS 2015, New York, USA; 06-02-2015 - 06-05-2015; in: "ACNS 2015", Springer, Heidelberg (2015), ISBN: 978-3319281650; 307 - 327.

  2. M.T. Beck, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures";
    Talk: Australasian Conference on Information Security and Privacy - ACISP 2017, Auckland, Neuseeland; 07-03-2017 - 07-05-2017; in: "ACISP 2017, Part I", J. Pieprzyk, S. Suriadi (ed.); Springer Verlag, LNCS 10342 (2017), ISBN: 978-3-319-60055-0; 437 - 452.

  3. M.T. Beck, S. Krenn, F.S. Preiss, K. Samelin:
    "Practical Signing-Right Revocation";
    Talk: Trust and Trustworthy Computing - TRUST 2016, Vienna; 08-29-2016 - 08-30-2016; in: "TRUST 2016", Springer, Heidelberg (2016), ISBN: 978-3-319-45571-6; 21 - 39.

  4. J. Bobolz, F. Eidens, S. Krenn, D. Slamanig, C. Striecks:
    "Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection";
    Talk: 15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020, Virtual Event; 10-05-2020 - 10-09-2020; in: "15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020", Association for Computing Machinery, New York, United States (2020), ISBN: 978-1-4503-6750-9; 319 - 333.

  5. J. Camenisch, R. Enderlein, S. Krenn, R. Küsters, D. Rausch:
    "Universal Composition with Responsive Environments";
    Talk: Advances in Cryptology - ASIACRYPT 2016, Hanoi, Vietnam; 12-04-2016 - 12-08-2016; in: "Advances in Cryptology - ASIACRYPT 2016 Part II", J. Cheon, T. Takagi (ed.); Springer, LNCS 10032 (2016), ISBN: 978-3-662-53889-0; 807 - 840.

  6. J. Camenisch, S. Krenn, R. Küsters, D. Rausch:
    "iUC: Flexible Universal Composability Made Simple";
    in: "Advances in Cryptology - ASIACRYPT 2019", LNCS 11923; S. Galbraith, S. Moriai (ed.); Springer, Cham, Switerland, 2019, ISBN: 978-3-030-34618-8, 191 - 221.

  7. J. Camenisch, S. Krenn, A. Lehmann, G. Mikkelsen, G. Neven, M. Pedersen:
    "Formal Treatment of Privacy-Enhancing Credential Systems";
    Talk: Selected Areas in Cryptography - SAC 2015, Sackville,NB, Canada; 08-12-2015 - 08-14-2015; in: "SAC 2015", Springer, Heidelberg (2015), ISBN: 978-3-319-31300-9; 3 - 24.

  8. P. Chiaro, S. Fischer-Hübner, T. Groß, S. Krenn, T. Lorünser, A. Martínez Garcí, A. Migliavacca, K. Rannenberg, D. Slamanig, C. Striecks, A. Zanini:
    "Secure and Privacy-Friendly Storage and Data Processing in the Cloud";
    in: "Privacy and Identity Management. The Smart Revolution", 526; M. Hansen, E. Kosta, I. Nai-Fovino, S. Fischer-Hübner (ed.); Springer, Springer International Publishing, Cham, Schweiz, 2018, ISBN: 978-3-319-92924-8, 153 - 169.

  9. D. Demirel, S. Krenn, T. Lorünser, G. Traverso:
    "Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System";
    Talk: ARES 2016, Salzburg; 08-31-2016 - 09-02-2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; 88 - 97.

  10. D. Derler, S. Krenn, T. Lorünser, S. Ramacher, D. Slamanig, C. Striecks:
    "Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications";
    Talk: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil; 03-25-2018 - 03-29-2018; in: "21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018", Springer, 10769 (2018), ISBN: 978-3-319-76577-8; 219 - 250.

  11. D. Derler, S. Krenn, K. Samelin, D. Slamanig:
    "Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions";
    Talk: 12th Conference on Security and Cryptography for Networks - SCN 2020, Virtual Event; 09-14-2020 - 09-16-2020; in: "12th Conference on Security and Cryptography for Networks - SCN 2020", Springer, Lecture Notes in Computer Science, 12238 (2020), ISBN: 978-3-030-57989-0; 427 - 447.

  12. D. Derler, S. Krenn, D. Slamanig:
    "Signer- Anonymous Designated- Verifier Redactable Signatures for Cloud-Based Data Sharing";
    Talk: Cryptology and Network Security- CANS 2016, Mailand, Italien; 11-14-2016 - 11-16-2016; in: "Cryptology and Network Security- CANS 2016", S. Foresti, G. Persiano (ed.); Springer Verlag, LNCS 10052 (2016), ISBN: 978-3-319-48964-3; 211 - 227.

  13. U. Haböck, S. Krenn:
    "Breaking and Fixing Anonymous Credentials for the Cloud";
    in: "Cryptology and Network Security- CANS 2019", 11829; Springer, Cham, Switzerland, 2019, ISBN: 978-3-030-31577-1, 249 - 269.

  14. A. Happe, S. Krenn, T. Lorünser:
    "Malicious Clients in Distributed Secret Sharing Based Storage Networks";
    Talk: Security Protocols XXIV - SPW 2016, Brno, Czech Republic; 04-07-2016 - 04-08-2016; in: "Security Protocols XXVI - SPW 2016", J. Anderson, V. Matyàs, B. Christianson, F. Stajano (ed.); Springer Verlag, (2016), ISBN: 978-3-319-62032-9; 206 - 214.

  15. F. Hörander, S. Krenn, A. Migliavacca, F. Thiemer, B. Zwattendorfer:
    "CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing";
    Talk: SECPID@ARES 2016, Salzburg; 08-31-2016 - 09-02-2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; 742 - 749.

  16. F. Karegar, C. Striecks, S. Krenn, F. Hörandner, T. Lorünser, S. Fischer-Hübner:
    "Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider";
    Talk: Privacy and Identity Management. IFIP Summer School 2016, Karlstad, Sweden; 08-21-2016 - 08-26-2016; in: "Privacy and Identity Management 2016", Springer Verlag, IFIP Advances in Information and Communication Technology 498 (2016), ISBN: 978-3-319-55782-3; 76 - 91.

  17. K. Koch, S. Krenn, D. Pellegrino, S. Ramacher:
    "Privacy-preserving Analytics for Data Merkets using MPC";
    Talk: IFIP Summer School on Privacy and Identity Management, Maribor, Slovenia; 09-20-2020 - 09-23-2020; in: "Privacy and Identity Management. Privacy and Identity 2020. IFIP Advances in Information and Communication Technology", Springer, 619/Cham, Switzerland (2020), ISBN: 978-3-030-72464-1; 226 - 246.

  18. A. Kostopoulos, E. Sfakianakis, I. Chochliouros, J. Pettersson, S. Krenn, W. Tesfay, A. Migliavacca, F. Hörandner:
    "Towards the Adoption of Secure Cloud Identity Services";
    Talk: SECPID@ARES 2017, Reggio Calabria, Italien; 08-29-2017 - 09-01-2017; in: "SECPID@ARES 2017", ACM, (2017), ISBN: 978-1-4503-5257-4; 90:1 - 90:7.

  19. S. Krenn, F. Benhamouda, V. Lyubashevsky, K. Pietrzak:
    "Efficient Zero-Knowledge Proofs for Commitments from Learning wiht Errors over Rings";
    Talk: European Symposium on Research in Computer Security - ESORICS 2015, Wien; 09-23-2015 - 09-25-2015; in: "ESORICS 2015", Springer, LNCS 9326 (2015), ISBN: 978-3-319-24173-9; ++.

  20. S. Krenn, T. Lorünser, S. Salzer, C. Striecks:
    "Towards Attribute-Based Credentials in the Cloud";
    Talk: Cryptology and Network Security - CANS 2017, Hongkong; 11-29-2016 - 12-01-2016; in: "Cryptology and Network Security - CANS 2017", S. Capkun, S. Chow (ed.); Springer Verlag, (2016), 166 - 187.

  21. S. Krenn, T. Lorünser, C. Striecks:
    "Batch-verifiable Secret Sharing with Unconditional Privacy";
    Talk: International Conference on Information Systems Security and Privacy - ICISSP 2017, Porto, Portugal; 02-19-2017 - 02-21-2017; in: "ICISSP 2017", SciTePress, (2017), ISBN: 978-989-758-209-7; 303 - 311.

  22. S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications";
    Talk: 10th International Conference on Cryptology in Africa - AFRICACRYPT 2018, Marrakesh, Morocco; 05-07-2018 - 05-09-2018; in: "10th International Conference on Cryptology in Africa - AFRICACRYPT 2018", Springer, 10831 (2018), ISBN: 978-3-319-89338-9; 11 - 32.

  23. S. Krenn, K. Samelin, D. Sommer:
    "Stronger Security for Sanitizable Signatures";
    Talk: International Workshop on Data Privacy, Wien; 09-21-2015 - 09-22-2015; in: "DPM and QASA 2015", Springer, LNCS volume 9481 (2015), ISBN: 978-3-319-29883-2; 100 - 117.

  24. S. Krenn, K. Samelin, C. Striecks:
    "Practical Group-Signatures with Privacy-Friendly Openings";
    in: "Availability, Reliability and Security - ARES 2019", ACM, New York, 2019, ISBN: 978-1-4503-7164-3, 1 - 10.

  25. S. Rührup, S. Krenn:
    "Towards Privacy in Geographic Message Dissemination for Connected Vehicles";
    in: "International Conference on Connected Vehicles and Expo - ICCVE 2019", IEEE, USA, 2019, ISBN: 978-1-7281-0143-9, 17 - 22.

  26. D. Slamanig, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin:
    "Chameleon-Hashes with Ephemeral Trapdoors -- And Applications to Invisible Sanitizable Signatures";
    Talk: 20th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2017, Amsterdam, Niederlande; 03-28-2017 - 03-31-2017; in: "PKC 2017, Part II", S. Fehr (ed.); Springer, LNCS 10175 (2017), ISBN: 978-3662543870; 152 - 182.

  27. D. Slamanig, S. Krenn, C. Pöhls, K. Samelin:
    "Protean Signature Schemes";
    Talk: 17th International Conference on Cryptology And Network Security (CANS 2018), Naples; 09-30-2018 - 10-03-2018; in: "17th International Conference on Cryptology And Network Security (CANS 2018)", Springer, Lecture Notes in Computer Science, vol. 11124 (2018), ISBN: 978-3-030-00434-7; 256 - 276.


Talks and Poster Presentations at Conferences

28 records:
  1. F. Baldimtsi, J. Camenisch, L. Hanzlik, S. Krenn, A. Lehmann, G. Neven:
    "Recovering Lost Device-Bound Credentials";
    Talk: Applied Cryptography and Network Security - ACNS 2015, New York, USA; 06-02-2015 - 06-05-2015; in: "ACNS 2015", Springer, Heidelberg (2015), ISBN: 978-3319281650; 307 - 327.

  2. M.T. Beck, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures";
    Talk: Australasian Conference on Information Security and Privacy - ACISP 2017, Auckland, Neuseeland; 07-03-2017 - 07-05-2017; in: "ACISP 2017, Part I", J. Pieprzyk, S. Suriadi (ed.); Springer Verlag, LNCS 10342 (2017), ISBN: 978-3-319-60055-0; 437 - 452.

  3. M.T. Beck, S. Krenn, F.S. Preiss, K. Samelin:
    "Practical Signing-Right Revocation";
    Talk: Trust and Trustworthy Computing - TRUST 2016, Vienna; 08-29-2016 - 08-30-2016; in: "TRUST 2016", Springer, Heidelberg (2016), ISBN: 978-3-319-45571-6; 21 - 39.

  4. J. Bobolz, F. Eidens, S. Krenn, D. Slamanig, C. Striecks:
    "Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection";
    Talk: 15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020, Virtual Event; 10-05-2020 - 10-09-2020; in: "15th ACM ASIA Conference on Computer and Communications Security - ACM ASIACCS 2020", Association for Computing Machinery, New York, United States (2020), ISBN: 978-1-4503-6750-9; 319 - 333.

  5. J. Camenisch, R. Enderlein, S. Krenn, R. Küsters, D. Rausch:
    "Universal Composition with Responsive Environments";
    Talk: Advances in Cryptology - ASIACRYPT 2016, Hanoi, Vietnam; 12-04-2016 - 12-08-2016; in: "Advances in Cryptology - ASIACRYPT 2016 Part II", J. Cheon, T. Takagi (ed.); Springer, LNCS 10032 (2016), ISBN: 978-3-662-53889-0; 807 - 840.

  6. J. Camenisch, S. Krenn, A. Lehmann, G. Mikkelsen, G. Neven, M. Pedersen:
    "Formal Treatment of Privacy-Enhancing Credential Systems";
    Talk: Selected Areas in Cryptography - SAC 2015, Sackville,NB, Canada; 08-12-2015 - 08-14-2015; in: "SAC 2015", Springer, Heidelberg (2015), ISBN: 978-3-319-31300-9; 3 - 24.

  7. D. Demirel, S. Krenn, T. Lorünser, G. Traverso:
    "Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System";
    Talk: ARES 2016, Salzburg; 08-31-2016 - 09-02-2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; 88 - 97.

  8. D. Derler, S. Krenn, T. Lorünser, S. Ramacher, D. Slamanig, C. Striecks:
    "Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications";
    Talk: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018, Rio De Janeiro, Brazil; 03-25-2018 - 03-29-2018; in: "21st IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2018", Springer, 10769 (2018), ISBN: 978-3-319-76577-8; 219 - 250.

  9. D. Derler, S. Krenn, K. Samelin, D. Slamanig:
    "Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions";
    Talk: 12th Conference on Security and Cryptography for Networks - SCN 2020, Virtual Event; 09-14-2020 - 09-16-2020; in: "12th Conference on Security and Cryptography for Networks - SCN 2020", Springer, Lecture Notes in Computer Science, 12238 (2020), ISBN: 978-3-030-57989-0; 427 - 447.

  10. D. Derler, S. Krenn, D. Slamanig:
    "Signer- Anonymous Designated- Verifier Redactable Signatures for Cloud-Based Data Sharing";
    Talk: Cryptology and Network Security- CANS 2016, Mailand, Italien; 11-14-2016 - 11-16-2016; in: "Cryptology and Network Security- CANS 2016", S. Foresti, G. Persiano (ed.); Springer Verlag, LNCS 10052 (2016), ISBN: 978-3-319-48964-3; 211 - 227.

  11. A. Happe, S. Krenn, T. Lorünser:
    "Malicious Clients in Distributed Secret Sharing Based Storage Networks";
    Talk: Security Protocols XXIV - SPW 2016, Brno, Czech Republic; 04-07-2016 - 04-08-2016; in: "Security Protocols XXVI - SPW 2016", J. Anderson, V. Matyàs, B. Christianson, F. Stajano (ed.); Springer Verlag, (2016), ISBN: 978-3-319-62032-9; 206 - 214.

  12. F. Hörander, S. Krenn, A. Migliavacca, F. Thiemer, B. Zwattendorfer:
    "CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing";
    Talk: SECPID@ARES 2016, Salzburg; 08-31-2016 - 09-02-2016; in: "ARES 2016", IEEE Computer Society, (2016), ISBN: 978-1-5090-0990-9; 742 - 749.

  13. F. Karegar, C. Striecks, S. Krenn, F. Hörandner, T. Lorünser, S. Fischer-Hübner:
    "Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider";
    Talk: Privacy and Identity Management. IFIP Summer School 2016, Karlstad, Sweden; 08-21-2016 - 08-26-2016; in: "Privacy and Identity Management 2016", Springer Verlag, IFIP Advances in Information and Communication Technology 498 (2016), ISBN: 978-3-319-55782-3; 76 - 91.

  14. K. Koch, S. Krenn, D. Pellegrino, S. Ramacher:
    "Privacy-preserving Analytics for Data Merkets using MPC";
    Talk: IFIP Summer School on Privacy and Identity Management, Maribor, Slovenia; 09-20-2020 - 09-23-2020; in: "Privacy and Identity Management. Privacy and Identity 2020. IFIP Advances in Information and Communication Technology", Springer, 619/Cham, Switzerland (2020), ISBN: 978-3-030-72464-1; 226 - 246.

  15. A. Kostopoulos, E. Sfakianakis, I. Chochliouros, J. Pettersson, S. Krenn, W. Tesfay, A. Migliavacca, F. Hörandner:
    "Towards the Adoption of Secure Cloud Identity Services";
    Talk: SECPID@ARES 2017, Reggio Calabria, Italien; 08-29-2017 - 09-01-2017; in: "SECPID@ARES 2017", ACM, (2017), ISBN: 978-1-4503-5257-4; 90:1 - 90:7.

  16. S. Krenn:
    "Anonymous Credential Systems - Theory & Practice";
    Talk: Privacy Enhancing Technologies and Security Solutions for the Smart Grid User Domain - PRETSELS, Puch bei Hallein (invited); 09-21-2015 - 09-22-2015.

  17. S. Krenn:
    "CyberSec4Europe Aiming to safeguard values through excellence in cybersecurity";
    Talk: Plattform Industrie 4.0- Workshop Security & Safety, Wien (virtuell) (invited); 10-30-2020.

  18. S. Krenn:
    "European digital sovereignty and global competitiveness by secure mobile working and smart data sharing: Part II";
    Talk: ECSEL Austria Conference 2021 "Sustainable Society: Move Data, not People" - Positioning Europe, Wien (invited); 10-18-2021.

  19. S. Krenn:
    "New Generation of Cryptographic Security - Beyond Basic Encryption and Signatures";
    Talk: Building a Cyber Resilient Society in South-Eastern Europe- Advanced Training Course, RACVIAC - Centre for Security Cooperation, Zagreb, Kroatien (invited); 10-17-2016 - 10-21-2016.

  20. S. Krenn:
    "Secure Multi Party Computation and Privacy-Preserving Data Markets";
    Talk: FITCE Congress for ICT Professionals, Wien (invited); 09-29-2021 - 09-30-2021.

  21. S. Krenn:
    "Standardisierung von Post-Quantum Kryptographie";
    Talk: CSP Cyber Sicherheit Plattform Österreich Workshop, Wien (invited); 11-12-2021.

  22. S. Krenn, F. Benhamouda, V. Lyubashevsky, K. Pietrzak:
    "Efficient Zero-Knowledge Proofs for Commitments from Learning wiht Errors over Rings";
    Talk: European Symposium on Research in Computer Security - ESORICS 2015, Wien; 09-23-2015 - 09-25-2015; in: "ESORICS 2015", Springer, LNCS 9326 (2015), ISBN: 978-3-319-24173-9; ++.

  23. S. Krenn, T. Lorünser, S. Salzer, C. Striecks:
    "Towards Attribute-Based Credentials in the Cloud";
    Talk: Cryptology and Network Security - CANS 2017, Hongkong; 11-29-2016 - 12-01-2016; in: "Cryptology and Network Security - CANS 2017", S. Capkun, S. Chow (ed.); Springer Verlag, (2016), 166 - 187.

  24. S. Krenn, T. Lorünser, C. Striecks:
    "Batch-verifiable Secret Sharing with Unconditional Privacy";
    Talk: International Conference on Information Systems Security and Privacy - ICISSP 2017, Porto, Portugal; 02-19-2017 - 02-21-2017; in: "ICISSP 2017", SciTePress, (2017), ISBN: 978-989-758-209-7; 303 - 311.

  25. S. Krenn, C. Pöhls, K. Samelin, D. Slamanig:
    "Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications";
    Talk: 10th International Conference on Cryptology in Africa - AFRICACRYPT 2018, Marrakesh, Morocco; 05-07-2018 - 05-09-2018; in: "10th International Conference on Cryptology in Africa - AFRICACRYPT 2018", Springer, 10831 (2018), ISBN: 978-3-319-89338-9; 11 - 32.

  26. S. Krenn, K. Samelin, D. Sommer:
    "Stronger Security for Sanitizable Signatures";
    Talk: International Workshop on Data Privacy, Wien; 09-21-2015 - 09-22-2015; in: "DPM and QASA 2015", Springer, LNCS volume 9481 (2015), ISBN: 978-3-319-29883-2; 100 - 117.

  27. D. Slamanig, J. Camenisch, D. Derler, S. Krenn, C. Pöhls, K. Samelin:
    "Chameleon-Hashes with Ephemeral Trapdoors -- And Applications to Invisible Sanitizable Signatures";
    Talk: 20th International Conference on Practice and Theory of Public-Key Cryptography - PKC 2017, Amsterdam, Niederlande; 03-28-2017 - 03-31-2017; in: "PKC 2017, Part II", S. Fehr (ed.); Springer, LNCS 10175 (2017), ISBN: 978-3662543870; 152 - 182.

  28. D. Slamanig, S. Krenn, C. Pöhls, K. Samelin:
    "Protean Signature Schemes";
    Talk: 17th International Conference on Cryptology And Network Security (CANS 2018), Naples; 09-30-2018 - 10-03-2018; in: "17th International Conference on Cryptology And Network Security (CANS 2018)", Springer, Lecture Notes in Computer Science, vol. 11124 (2018), ISBN: 978-3-030-00434-7; 256 - 276.


Diploma and Master Theses

1 record:
  1. D. Köhle:
    "ABC for Privacy Implementing a Framework for Privacy-Preserving Authentication in the Cloud";
    Supervisor: S. Krenn, U. Haböck; FH Campus Wien, 2018; final examination: 09-21-2018.