Follow
Christian Matt
Christian Matt
Primev
Verified email at primev.xyz - Homepage
Title
Cited by
Cited by
Year
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory 63 (5), 3277-3305, 2017
962017
Indistinguishability obfuscation without multilinear maps: New paradigms via low degree weak pseudorandomness and security amplification
P Ananth, A Jain, H Lin, C Matt, A Sahai
Annual International Cryptology Conference, 284-332, 2019
752019
How to leverage hardness of constant-degree expanding polynomials over to build
A Jain, H Lin, C Matt, A Sahai
Annual International Conference on the Theory and Applications of …, 2019
66*2019
Afgjort: A partially synchronous finality layer for blockchains
T Dinsdale-Young, B Magri, C Matt, JB Nielsen, D Tschudi
International Conference on Security and Cryptography for Networks, 24-44, 2020
50*2020
The one-time pad revisited
C Matt, U Maurer
2013 IEEE International Symposium on Information Theory, 2706-2710, 2013
492013
GearBox: Optimal-size shard committees by leveraging the safety-liveness dichotomy
B David, B Magri, C Matt, JB Nielsen, D Tschudi
2022 ACM SIGSAC Conference on Computer and Communications Security, 683-696, 2022
44*2022
Augmented secure channels and the goal of the TLS 1.3 record layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
412015
Pseudo flawed-smudging generators and their application to indistinguishability obfuscation
H Lin, C Matt
IACR Cryptology ePrint Archive 2018, 646, 2018
352018
Strengthening access control encryption
C Badertscher, C Matt, U Maurer
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
332017
A definitional framework for functional encryption
C Matt, U Maurer
2015 IEEE 28th Computer Security Foundations Symposium, 217-231, 2015
17*2015
Formalizing delayed adaptive corruptions and the security of flooding networks
C Matt, JB Nielsen, SE Thomsen
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
152022
Robust authenticated encryption and the limits of symmetric cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
142015
Idealizing identity-based encryption
D Hofheinz, C Matt, U Maurer
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
132015
Practical provably secure flooding for blockchains
CD Liu Zhang, C Matt, U Maurer, G Rito, S Eller Thomsen
Advances in Cryptology–ASIACRYPT 2022 13791, 774-805, 2023
92023
Policy-compliant signatures
C Badertscher, C Matt, H Waldner
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
82021
Toward an algebraic theory of systems
C Matt, U Maurer, C Portmann, R Renner, B Tackmann
Theoretical Computer Science 747, 1-25, 2018
82018
Asymptotically optimal message dissemination with applications to blockchains
CD Liu-Zhang, C Matt, SE Thomsen
Annual International Conference on the Theory and Applications of …, 2024
72024
Weight-based Nakamoto-style blockchains
SH Kamp, B Magri, C Matt, JB Nielsen, SE Thomsen, D Tschudi
International Conference on Cryptology and Information Security in Latin …, 2021
4*2021
Updatable policy-compliant signatures
C Badertscher, M Maitra, C Matt, H Waldner
IACR International Conference on Public-Key Cryptography 14601, 105-132, 2024
2024
A constructive treatment of enhanced encryption schemes
C Matt
ETH Zurich, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20