Follow
Julian Loss
Julian Loss
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
The algebraic group model and its applications
G Fuchsbauer, E Kiltz, J Loss
Annual International Cryptology Conference, 33-62, 2018
2732018
On the security of two-round multi-signatures
M Drijvers, K Edalatnejad, B Ford, E Kiltz, J Loss, G Neven, I Stepanovs
IEEE Symposium on Security and Privacy, 1084-1101, 2019
1222019
On the (in) security of ROS
F Benhamouda, T Lepoint, J Loss, M Orrù, M Raykova
Journal of Cryptology 35 (4), 25, 2022
872022
On the security of time-lock puzzles and timed commitments
J Katz, J Loss, J Xu
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
572020
A modular treatment of blind signatures from identification schemes
E Hauck, E Kiltz, J Loss
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
502019
Asynchronous byzantine agreement with subquadratic communication
E Blum, J Katz, CD Liu-Zhang, J Loss
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
492020
Lattice-based blind signatures, revisited
E Hauck, E Kiltz, J Loss, NK Nguyen
Annual International Cryptology Conference, 500-529, 2020
472020
Synchronous consensus with optimal asynchronous fallback guarantees
E Blum, J Katz, J Loss
Theory of Cryptography Conference, 131-150, 2019
442019
A formal treatment of deterministic wallets
P Das, S Faust, J Loss
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
432019
A classification of computational assumptions in the algebraic group model
B Bauer, G Fuchsbauer, J Loss
Annual International Cryptology Conference, 121-151, 2020
412020
Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds
J Loss, T Moran
392018
On the adaptive security of the threshold BLS signature scheme
R Bacho, J Loss
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
382022
On pairing-free blind signature schemes in the algebraic group model
J Kastner, J Loss, J Xu
IACR International Conference on Public-Key Cryptography, 468-497, 2022
352022
Efficient and universally composable protocols for oblivious transfer from the CDH assumption
E Hauck, J Loss
Cryptology ePrint Archive, 2017
342017
Always have a backup plan: fully secure synchronous MPC with asynchronous fallback
E Blum, CD Liu-Zhang, J Loss
Annual International Cryptology Conference, 707-731, 2020
272020
Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions
E Blum, J Katz, J Loss
International Conference on the Theory and Application of Cryptology and …, 2021
26*2021
Boosting the Security of Blind Signature Schemes
J Katz, J Loss, M Rosenberg
International Conference on the Theory and Application of Cryptology and …, 2021
232021
Gossiping for communication-efficient broadcast
G Tsimos, J Loss, C Papamanthou
Annual International Cryptology Conference, 439-469, 2022
22*2022
PI-Cut-Choo and Friends: Compact Blind Signatures via Parallel Instance Cut-and-Choose and More
R Chairattana-Apirom, L Hanzlik, J Loss, A Lysyanskaya, B Wagner
Annual International Cryptology Conference, 3-31, 2022
18*2022
The exact security of BIP32 wallets
P Das, A Erwig, S Faust, J Loss, S Riahi
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
172021
The system can't perform the operation now. Try again later.
Articles 1–20