Follow
Carsten Baum
Title
Cited by
Cited by
Year
Turning your weakness into a strength: Watermarking deep neural networks by backdooring
Y Adi, C Baum, M Cisse, B Pinkas, J Keshet
27th {USENIX} Security Symposium ({USENIX} Security 18), 1615-1631, 2018
4092018
More efficient commitments from structured lattice assumptions
C Baum, I Damgård, V Lyubashevsky, S Oechsner, C Peikert
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
140*2018
Publicly auditable secure multi-party computation
C Baum, I Damgård, C Orlandi
Security and Cryptography for Networks: 9th International Conference, SCN …, 2014
1212014
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits⋆
C Baum, J Bootle, A Cerulli, R del Pino, J Groth, V Lyubashevsky
IACR Crypto 2018, 2018
822018
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
C Baum, H Lin, S Oechsner
572018
: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
C Baum, AJ Malozemoff, MB Rosen, P Scholl
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
522021
Concretely-efficient zero-knowledge arguments for arithmetic circuits and their application to lattice-based cryptography
C Baum, A Nof
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
512020
Using TopGear in overdrive: a more efficient ZKPoK for SPDZ
C Baum, D Cozzo, NP Smart
Selected Areas in Cryptography–SAC 2019: 26th International Conference …, 2020
402020
How to prove knowledge of small secrets
C Baum, I Damgård, KG Larsen, M Nielsen
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
392016
Better preprocessing for secure multiparty computation
C Baum, I Damgård, T Toft, R Zakarias
Applied Cryptography and Network Security: 14th International Conference …, 2016
342016
P2DEX: privacy-preserving decentralized cryptocurrency exchange
C Baum, B David, TK Frederiksen
Applied Cryptography and Network Security: 19th International Conference …, 2021
322021
Insured MPC: Efficient secure computation with financial penalties
C Baum, B David, R Dowsley
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
29*2020
Efficient secure multiparty computation with identifiable abort
C Baum, E Orsini, P Scholl
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
292016
Banquet: short and fast signatures from AES
C Baum, CD de Saint Guilhem, D Kales, E Orsini, P Scholl, G Zaverucha
Public-Key Cryptography–PKC 2021: 24th IACR International Conference on …, 2021
282021
TARDIS: a foundation of time-lock puzzles in UC
C Baum, B David, R Dowsley, JB Nielsen, S Oechsner
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
25*2021
Efficient constant-round MPC with identifiable abort and public verifiability
C Baum, E Orsini, P Scholl, E Soria-Vazquez
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
222020
CRAFT: Composable Randomness and Almost Fairness from Time.
C Baum, B David, R Dowsley, JB Nielsen, S Oechsner
IACR Cryptol. ePrint Arch. 2020, 784, 2020
20*2020
Efficient protocols for oblivious linear function evaluation from ring-LWE
C Baum, D Escudero, A Pedrouzo-Ulloa, P Scholl, JR Troncoso-Pastoriza
Journal of Computer Security 30 (1), 39-78, 2022
172022
Fairness in the eyes of the data: Certifying machine-learning models
S Segal, Y Adi, B Pinkas, C Baum, C Ganesh, J Keshet
Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society, 926-935, 2021
172021
Simple amortized proofs of shortness for linear relations over polynomial rings
C Baum, V Lyubashevsky
Cryptology ePrint Archive, 2017
172017
The system can't perform the operation now. Try again later.
Articles 1–20