Follow
Julian Loss
Julian Loss
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
The algebraic group model and its applications
G Fuchsbauer, E Kiltz, J Loss
Annual International Cryptology Conference, 33-62, 2018
1882018
On the security of two-round multi-signatures
M Drijvers, K Edalatnejad, B Ford, E Kiltz, J Loss, G Neven, I Stepanovs
IEEE Symposium on Security and Privacy, 1084-1101, 2019
932019
On the (in) security of ROS
F Benhamouda, T Lepoint, J Loss, M Orrù, M Raykova
Journal of Cryptology 35 (4), 25, 2022
562022
On the security of time-lock puzzles and timed commitments
J Katz, J Loss, J Xu
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
372020
Lattice-based blind signatures, revisited
E Hauck, E Kiltz, J Loss, NK Nguyen
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
362020
A modular treatment of blind signatures from identification schemes
E Hauck, E Kiltz, J Loss
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
352019
Synchronous consensus with optimal asynchronous fallback guarantees
E Blum, J Katz, J Loss
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
332019
A formal treatment of deterministic wallets
P Das, S Faust, J Loss
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
312019
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
J Loss, T Moran
302018
A classification of computational assumptions in the algebraic group model
B Bauer, G Fuchsbauer, J Loss
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
292020
Efficient and universally composable protocols for oblivious transfer from the CDH assumption
E Hauck, J Loss
Cryptology ePrint Archive, 2017
292017
Asynchronous byzantine agreement with subquadratic communication
E Blum, J Katz, CD Liu-Zhang, J Loss
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
262020
On pairing-free blind signature schemes in the algebraic group model
J Kastner, J Loss, J Xu
IACR International Conference on Public-Key Cryptography, 468-497, 2022
182022
Always have a backup plan: fully secure synchronous MPC with asynchronous fallback
E Blum, CD Liu-Zhang, J Loss
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
182020
Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions
E Blum, J Katz, J Loss
International Conference on the Theory and Application of Cryptology and …, 2021
17*2021
Boosting the Security of Blind Signature Schemes
J Katz, J Loss, M Rosenberg
International Conference on the Theory and Application of Cryptology and …, 2021
122021
Gossiping for communication-efficient broadcast
G Tsimos, J Loss, C Papamanthou
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
11*2022
MPC with synchronous security and asynchronous responsiveness
CD Liu-Zhang, J Loss, U Maurer, T Moran, D Tschudi
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
11*2020
The exact security of BIP32 wallets
P Das, A Erwig, S Faust, J Loss, S Riahi
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
102021
Algebraic adversaries in the universal composability framework
M Abdalla, M Barbosa, J Katz, J Loss, J Xu
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
92021
The system can't perform the operation now. Try again later.
Articles 1–20