| Publication | Date of Publication | Type |
|---|
Encrypted multi-map that hides query, access, and volume patterns | 2025-01-10 | Paper |
Provable security analysis of FIDO2 | 2022-04-22 | Paper |
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC Journal of Cryptology | 2021-07-30 | Paper |
Masking fuzzy-searchable public databases | 2020-01-30 | Paper |
Hedging public-key encryption in the real world | 2017-10-27 | Paper |
How to Strengthen the Security of RSA-OAEP IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Provably-secure remote memory attestation for heap overflow protection Lecture Notes in Computer Science | 2016-10-21 | Paper |
On symmetric encryption with distinguishable decryption failures Fast Software Encryption | 2015-09-18 | Paper |
Efficient Fuzzy Search on Encrypted Data Fast Software Encryption | 2015-09-18 | Paper |
On-line ciphers and the Hash-CBC constructions Journal of Cryptology | 2013-01-04 | Paper |
Security of symmetric encryption in the presence of ciphertext fragmentation Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
A new pseudorandom generator from collision-resistant hash functions Lecture Notes in Computer Science | 2012-06-08 | Paper |
Secure proxy signature schemes for delegation of signing rights Journal of Cryptology | 2012-05-23 | Paper |
Order-preserving encryption revisited: improved security analysis and alternative solutions Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Theft-protected proprietary certificates Lecture Notes in Computer Science | 2011-03-18 | Paper |
Search on encrypted data in the symmetric-key setting Selected Areas in Cryptography | 2011-03-15 | Paper |
Foundations of non-malleable hash and one-way functions Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Order-Preserving Symmetric Encryption Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Strengthening Security of RSA-OAEP Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
New Multiparty Signature Schemes for Network Routing Applications ACM Transactions on Information and System Security | 2009-02-24 | Paper |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles Lecture Notes in Computer Science | 2009-02-10 | Paper |
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the Security of OAEP Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
A Closer Look at PKI: Security and Efficiency Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
scientific article; zbMATH DE number 5009203 (Why is no real title available?) | 2006-03-01 | Paper |
scientific article; zbMATH DE number 2081087 (Why is no real title available?) | 2004-08-04 | Paper |
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
Randomness Re-use in Multi-recipient Encryption Schemeas Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
scientific article; zbMATH DE number 1842498 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1583803 (Why is no real title available?) | 2001-04-03 | Paper |