Serge Fehr
Cited by
Cited by
On quantum Rényi entropies: A new generalization and some properties
M Müller-Lennert, F Dupuis, O Szehr, S Fehr, M Tomamichel
Journal of Mathematical Physics 54 (12), 122203, 2013
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
Cryptography in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
SIAM Journal on Computing 37 (6), 1865-1890, 2008
On notions of security for deterministic encryption, and efficient constructions without random oracles
A Boldyreva, S Fehr, A O’Neill
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
M Tomamichel, S Fehr, J Kaniewski, S Wehner
New Journal of Physics 15 (10), 103002, 2013
Security of the Fiat-Shamir transformation in the quantum random-oracle model
J Don, S Fehr, C Majenz, C Schaffner
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
On the conditional Rényi entropy
S Fehr, S Berens
IEEE Transactions on Information Theory 60 (11), 6801-6810, 2014
Near-linear unconditionally-secure multiparty computation with a dishonest minority
E Ben-Sasson, S Fehr, R Ostrovsky
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
Perfect NIZK with adaptive soundness
M Abe, S Fehr
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
A tight high-order entropic quantum uncertainty relation with applications
IB Damgård, S Fehr, R Renner, L Salvail, C Schaffner
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
Efficient multi-party computation over rings
R Cramer, S Fehr, Y Ishai, E Kushilevitz
Eurocrypt 2656, 596-613, 2003
Optimal black-box secret sharing over arbitrary abelian groups
R Cramer, S Fehr
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
Security and composability of randomness expansion from Bell inequalities
S Fehr, R Gelles, C Schaffner
Physical Review A 87 (1), 012335, 2013
Secure identification and QKD in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
Encryption schemes secure against chosen-ciphertext selective opening attacks
S Fehr, D Hofheinz, E Kiltz, H Wee
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography
M Abe, S Fehr
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
Linear secret sharing schemes from error correcting codes and universal hash functions
R Cramer, IB Damgård, N Döttling, S Fehr, G Spini
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
On the cost of reconstructing a secret, or VSS with optimal reconstruction phase
R Cramer, I Damgård, S Fehr
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
Unconditionally-secure robust secret sharing with compact shares
A Cevallos, S Fehr, R Ostrovsky, Y Rabani
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20