Fingerprint

Dive into the research topics where Carsten Baum is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Low-Bandwidth Mixed Arithmetic in VOLE-Based ZK from Low-Degree PRGs

    Agarwal, A., Baum, C., Braun, L. & Scholl, P., 2025, Proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2025. Springer, Vol. 15604. p. 396-426

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • CaSCaDE: (Time-Based) Cryptography from Space Communications DElay

    Baum, C., David, B. M., Pagnin, E. & Takahashi, A., 2024, Proceedings of the 14th International Conference on Security and Cryptography for Networks (SCN 2024). Springer, Vol. 14973. p. 252-274

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs

    Baum, C., Melissaris, N., Rachuri, R. & Scholl, P., 2024, Proceedings of the 44th Annual International Cryptology Conference - CRYPTO 2024. Springer, Vol. 14927. p. 454-488

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

  • Efficient Maliciously Secure Oblivious Exponentiations

    Baum, C., Berlips, J., Chen, W., Damgård, I. B., Esvelt, K. M., Foner, L., Gretton, D., Kysel, M., Rivest, R. L., Roy, L., Sage-Ling, F., Shamir, A., Vaikuntanathan, V., Van Hauwe, L., Vogel, T., Weinstein-Raun, B., Wichs, D., Wooster, S., Yao, A. C. & Yu, Y., 2024, In: IACR Communications in Cryptology. 1, 3, 25 p.

    Research output: Contribution to journalJournal articleResearchpeer-review

    Open Access
    File
    1 Downloads (Orbit)
  • One Tree to Rule Them All: Optimizing GGM Trees and OWFs for Post-Quantum Signatures

    Baum, C., Beullens, W., Mukherjee, S., Orsini, E., Ramacher, S., Rechberger, C., Roy, L. & Scholl, P., 2024, Proceedings of International Conference on the Theory and Application of Cryptology and Information Security 2024, Asiacrypt . Springer, p. 463–493

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review