Follow
Christian Matt
Christian Matt
Primev
Verified email at primev.xyz - Homepage
Title
Cited by
Cited by
Year
Causal boxes: quantum information-processing systems closed under composition
C Portmann, C Matt, U Maurer, R Renner, B Tackmann
IEEE Transactions on Information Theory 63 (5), 3277-3305, 2017
862017
Indistinguishability obfuscation without multilinear maps: New paradigms via low degree weak pseudorandomness and security amplification
P Ananth, A Jain, H Lin, C Matt, A Sahai
Annual International Cryptology Conference, 284-332, 2019
692019
How to leverage hardness of constant-degree expanding polynomials over to build
A Jain, H Lin, C Matt, A Sahai
Annual International Conference on the Theory and Applications of …, 2019
61*2019
Afgjort: A partially synchronous finality layer for blockchains
T Dinsdale-Young, B Magri, C Matt, JB Nielsen, D Tschudi
International Conference on Security and Cryptography for Networks, 24-44, 2020
48*2020
The one-time pad revisited
C Matt, U Maurer
2013 IEEE International Symposium on Information Theory, 2706-2710, 2013
452013
Augmented secure channels and the goal of the TLS 1.3 record layer
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
422015
GearBox: Optimal-size shard committees by leveraging the safety-liveness dichotomy
B David, B Magri, C Matt, JB Nielsen, D Tschudi
2022 ACM SIGSAC Conference on Computer and Communications Security, 683-696, 2022
38*2022
Pseudo flawed-smudging generators and their application to indistinguishability obfuscation
H Lin, C Matt
IACR Cryptology ePrint Archive 2018, 646, 2018
332018
Strengthening access control encryption
C Badertscher, C Matt, U Maurer
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
302017
A definitional framework for functional encryption
C Matt, U Maurer
2015 IEEE 28th Computer Security Foundations Symposium, 217-231, 2015
16*2015
Formalizing delayed adaptive corruptions and the security of flooding networks
C Matt, JB Nielsen, SE Thomsen
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
142022
Robust authenticated encryption and the limits of symmetric cryptography
C Badertscher, C Matt, U Maurer, P Rogaway, B Tackmann
Cryptography and Coding: 15th IMA International Conference, IMACC 2015 …, 2015
142015
Idealizing identity-based encryption
D Hofheinz, C Matt, U Maurer
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
122015
Practical provably secure flooding for blockchains
CD Liu Zhang, C Matt, U Maurer, G Rito, S Eller Thomsen
Advances in Cryptology–ASIACRYPT 2022 13791, 774-805, 2023
82023
Policy-compliant signatures
C Badertscher, C Matt, H Waldner
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
72021
Toward an algebraic theory of systems
C Matt, U Maurer, C Portmann, R Renner, B Tackmann
Theoretical Computer Science 747, 1-25, 2018
72018
Asymptotically optimal message dissemination with applications to blockchains
CD Liu-Zhang, C Matt, SE Thomsen
Annual International Conference on the Theory and Applications of …, 2024
62024
Weight-based Nakamoto-style blockchains
SH Kamp, B Magri, C Matt, JB Nielsen, SE Thomsen, D Tschudi
International Conference on Cryptology and Information Security in Latin …, 2021
3*2021
Updatable policy-compliant signatures
C Badertscher, M Maitra, C Matt, H Waldner
IACR International Conference on Public-Key Cryptography 14601, 105-132, 2024
2024
A constructive treatment of enhanced encryption schemes
C Matt
ETH Zurich, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20