Follow
Carsten Baum
Title
Cited by
Cited by
Year
Turning your weakness into a strength: Watermarking deep neural networks by backdooring
Y Adi, C Baum, M Cisse, B Pinkas, J Keshet
27th USENIX security symposium (USENIX Security 18), 1615-1631, 2018
8112018
More efficient commitments from structured lattice assumptions
C Baum, I Damgård, V Lyubashevsky, S Oechsner, C Peikert
International Conference on Security and Cryptography for Networks, 368-385, 2018
203*2018
Publicly auditable secure multi-party computation
C Baum, I Damgård, C Orlandi
Security and Cryptography for Networks: 9th International Conference, SCN …, 2014
1562014
Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits⋆
C Baum, J Bootle, A Cerulli, R del Pino, J Groth, V Lyubashevsky
IACR Crypto 2018, 2018
1132018
: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
C Baum, AJ Malozemoff, MB Rosen, P Scholl
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
1122021
Concretely-efficient zero-knowledge arguments for arithmetic circuits and their application to lattice-based cryptography
C Baum, A Nof
IACR International Conference on Public-Key Cryptography, 495-526, 2020
1012020
Towards Practical Lattice-Based One-Time Linkable Ring Signatures
C Baum, H Lin, S Oechsner
922018
P2DEX: privacy-preserving decentralized cryptocurrency exchange
C Baum, B David, TK Frederiksen
International Conference on Applied Cryptography and Network Security, 163-194, 2021
722021
Using TopGear in overdrive: a more efficient ZKPoK for SPDZ
C Baum, D Cozzo, NP Smart
International Conference on Selected Areas in Cryptography, 274-302, 2019
682019
Banquet: short and fast signatures from AES
C Baum, CD de Saint Guilhem, D Kales, E Orsini, P Scholl, G Zaverucha
IACR International Conference on Public-Key Cryptography, 266-297, 2021
602021
TARDIS: a foundation of time-lock puzzles in UC
C Baum, B David, R Dowsley, JB Nielsen, S Oechsner
Annual International Conference on the Theory and Applications of …, 2021
58*2021
PESTO: proactively secure distributed single sign-on, or how to trust a hacked server
C Baum, T Frederiksen, J Hesse, A Lehmann, A Yanai
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 587-606, 2020
512020
Insured MPC: efficient secure computation with financial penalties
C Baum, B David, R Dowsley
Financial Cryptography and Data Security: 24th International Conference, FC …, 2020
502020
Efficient constant-round MPC with identifiable abort and public verifiability
C Baum, E Orsini, P Scholl, E Soria-Vazquez
Annual International Cryptology Conference, 562-592, 2020
432020
Efficient secure multiparty computation with identifiable abort
C Baum, E Orsini, P Scholl
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
432016
How to prove knowledge of small secrets
C Baum, I Damgård, KG Larsen, M Nielsen
Annual International Cryptology Conference, 478-498, 2016
422016
Sok: Mitigation of front-running in decentralized finance
C Baum, J Hsin-yu Chiang, B David, TK Frederiksen, L Gentile
International Conference on Financial Cryptography and Data Security, 250-271, 2022
412022
Better preprocessing for secure multiparty computation
C Baum, I Damgård, T Toft, R Zakarias
International Conference on Applied Cryptography and Network Security, 327-345, 2016
412016
CRAFT: Composable Randomness Beacons and Output-Independent Abort MPC From Time
C Baum, B David, R Dowsley, R Kishore, JB Nielsen, S Oechsner
IACR International Conference on Public-Key Cryptography, 439-470, 2023
39*2023
Mozarella: Efficient Vector-OLE and Zero-Knowledge Proofs over 
C Baum, L Braun, A Munch-Hansen, P Scholl
Annual International Cryptology Conference, 329-358, 2022
352022
The system can't perform the operation now. Try again later.
Articles 1–20