| Publication | Date of Publication | Type |
|---|
| Multi-signatures for ad-hoc and privacy-preserving group signing | 2024-11-12 | Paper |
| Password-based credentials with security against server compromise | 2024-06-05 | Paper |
| Short threshold dynamic group signatures | 2022-12-16 | Paper |
Compact privacy protocols from post-quantum and timed classical assumptions Post-Quantum Cryptography | 2022-10-13 | Paper |
| Selectively linkable group signatures -- stronger security and preserved verifiability | 2022-06-29 | Paper |
Updatable tokenization: formal definitions and provably secure constructions Financial Cryptography and Data Security | 2021-03-17 | Paper |
| (R)CCA secure updatable encryption with integrity protection | 2020-02-04 | Paper |
| Password-authenticated public-key encryption | 2020-01-30 | Paper |
| Group signatures with selective linkability | 2020-01-28 | Paper |
| Updatable encryption with post-compromise security | 2018-07-17 | Paper |
| The wonderful world of global random oracles | 2018-07-09 | Paper |
| Anonymous attestation with subverted TPMs | 2017-10-27 | Paper |
Virtual smart cards: how to sign with a password and a server Lecture Notes in Computer Science | 2016-10-21 | Paper |
Formal treatment of privacy-enhancing credential systems Lecture Notes in Computer Science | 2016-05-19 | Paper |
Universally composable Direct Anonymous Attestation Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Recovering lost device-bound credentials Applied Cryptography and Network Security | 2016-03-10 | Paper |
Robust multi-property combiners for hash functions Journal of Cryptology | 2014-09-25 | Paper |
Memento: how to reconstruct your secrets from a single password in a hostile environment Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
History-free sequential aggregate signatures Lecture Notes in Computer Science | 2012-09-25 | Paper |
On the joint security of encryption and signature in EMV Lecture Notes in Computer Science | 2012-06-08 | Paper |
Random oracles in a quantum world Lecture Notes in Computer Science | 2011-12-02 | Paper |
Random oracles with(out) programmability Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
History-Free Aggregate Message Authentication Codes Lecture Notes in Computer Science | 2010-09-10 | Paper |
Unlinkability of sanitizable signatures Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Public-key encryption with non-interactive opening: new constructions and stronger definitions Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Hash function combiners in TLS and SSL Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Delayed-key message authentication for streams Theory of Cryptography | 2010-02-24 | Paper |
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Security of Sanitizable Signatures Revisited Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Security-Amplifying Combiners for Collision-Resistant Hash Functions Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Robust Multi-property Combiners for Hash Functions Revisited Automata, Languages and Programming | 2008-08-19 | Paper |
Multi-property Preserving Combiners for Hash Functions Theory of Cryptography | 2008-03-05 | Paper |