Serge Fehr
TitleCited byYear
On quantum Rényi entropies: A new generalization and some properties
M Müller-Lennert, F Dupuis, O Szehr, S Fehr, M Tomamichel
Journal of Mathematical Physics 54 (12), 122203, 2013
3172013
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of …, 2008
2352008
On notions of security for deterministic encryption, and efficient constructions without random oracles
A Boldyreva, S Fehr, A O’Neill
Annual International Cryptology Conference, 335-359, 2008
2232008
Cryptography in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
SIAM Journal on Computing 37 (6), 1865-1890, 2008
1962008
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
1372014
Perfect NIZK with adaptive soundness
M Abe, S Fehr
Theory of Cryptography Conference, 118-136, 2007
882007
A tight high-order entropic quantum uncertainty relation with applications
IB Damgård, S Fehr, R Renner, L Salvail, C Schaffner
Annual International Cryptology Conference, 360-378, 2007
862007
Security and composability of randomness expansion from Bell inequalities
S Fehr, R Gelles, C Schaffner
Physical Review A 87 (1), 012335, 2013
842013
Efficient multi-party computation over rings
R Cramer, S Fehr, Y Ishai, E Kushilevitz
International Conference on the Theory and Applications of Cryptographic …, 2003
832003
Optimal black-box secret sharing over arbitrary Abelian groups
R Cramer, S Fehr
Annual International Cryptology Conference, 272-287, 2002
812002
On the conditional Rényi entropy
S Fehr, S Berens
IEEE Transactions on Information Theory 60 (11), 6801-6810, 2014
692014
Encryption schemes secure against chosen-ciphertext selective opening attacks
S Fehr, D Hofheinz, E Kiltz, H Wee
Annual International Conference on the Theory and Applications of …, 2010
682010
Near-linear unconditionally-secure multiparty computation with a dishonest minority
E Ben-Sasson, S Fehr, R Ostrovsky
Annual Cryptology Conference, 663-680, 2012
652012
Secure identification and QKD in the bounded-quantum-storage model
IB Damgård, S Fehr, L Salvail, C Schaffner
Annual International Cryptology Conference, 342-359, 2007
612007
Adaptively secure Feldman VSS and applications to universally-composable threshold cryptography
M Abe, S Fehr
Annual International Cryptology Conference, 317-334, 2004
582004
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
M Tomamichel, S Fehr, J Kaniewski, S Wehner
New Journal of Physics 15 (10), 103002, 2013
552013
On the cost of reconstructing a secret, or VSS with optimal reconstruction phase
R Cramer, I Damgård, S Fehr
Annual International Cryptology Conference, 503-523, 2001
542001
Unfair noisy channels and oblivious transfer
I Damgård, S Fehr, K Morozov, L Salvail
Theory of Cryptography Conference, 355-373, 2004
522004
Unconditionally-secure robust secret sharing with compact shares
A Cevallos, S Fehr, R Ostrovsky, Y Rabani
Annual International Conference on the Theory and Applications of …, 2012
432012
Composing quantum protocols in a classical environment
S Fehr, C Schaffner
Theory of Cryptography Conference, 350-367, 2009
412009
The system can't perform the operation now. Try again later.
Articles 1–20