| Publication | Date of Publication | Type |
|---|
Explicit optimal binary pebbling for one-way hash chain reversal Financial Cryptography and Data Security | 2021-04-07 | Paper |
| Fast secure comparison for medium-sized integers and its application in binarized neural networks | 2020-01-28 | Paper |
Secure simultaneous bit extraction from Koblitz curves Designs, Codes and Cryptography | 2019-01-11 | Paper |
| Binary pebbling algorithms for in-place reversal of one-way hash chains | 2018-01-09 | Paper |
Binary pebbling algorithms for in-place reversal of one-way hash chains (available as arXiv preprint) | 2018-01-09 | Paper |
Trinocchio: privacy-preserving outsourcing by distributed verifiable computation Applied Cryptography and Network Security | 2016-10-04 | Paper |
Certificate validation in secure computation and its use in verifiable linear programming Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
A tight lower bound for top-down skew heaps Information Processing Letters | 2016-05-26 | Paper |
Universally verifiable multiparty computation from threshold homomorphic cryptosystems Applied Cryptography and Network Security | 2016-03-10 | Paper |
Multi-authority secret-ballot elections with linear work Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
New security notions and relations for public-key encryption Journal of Mathematical Cryptology | 2013-01-17 | Paper |
Sharp lower bounds on the extractable randomness from non-uniform sources Information and Computation | 2011-10-10 | Paper |
Anonymous credential schemes with encrypted attributes Cryptology and Network Security | 2010-12-07 | Paper |
Verifiable Rotation of Homomorphic Encryptions Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
On Second-Order Differential Power Analysis Cryptographic Hardware and Embedded Systems – CHES 2005 | 2008-08-29 | Paper |
An Efficient Protocol for Fair Secure Two-Party Computation Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Efficient Binary Conversion for Paillier Encrypted Values Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Efficient Pseudorandom Generators Based on the DDH Assumption Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Practical and Secure Solutions for Integer Comparison Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
List signature schemes Discrete Applied Mathematics | 2006-04-28 | Paper |
| Practical Two-Party Computation Based on the Conditional Gate | 2005-08-12 | Paper |
A fair and efficient solution to the socialist millionaires' problem Discrete Applied Mathematics | 2001-10-30 | Paper |
| scientific article; zbMATH DE number 1504791 (Why is no real title available?) | 2000-09-12 | Paper |
| scientific article; zbMATH DE number 1418293 (Why is no real title available?) | 2000-07-26 | Paper |
| scientific article; zbMATH DE number 1440064 (Why is no real title available?) | 2000-05-07 | Paper |
| scientific article; zbMATH DE number 1406779 (Why is no real title available?) | 2000-03-01 | Paper |
Systolic arrays for the recognition of permutation-invariant segments Science of Computer Programming | 1997-03-31 | Paper |
| scientific article; zbMATH DE number 883898 (Why is no real title available?) | 1997-01-06 | Paper |
A systematic analysis of splaying Information Processing Letters | 1993-05-16 | Paper |
| scientific article; zbMATH DE number 54254 (Why is no real title available?) | 1993-01-23 | Paper |
The derivation of a tighter bound for top-down skew heaps Information Processing Letters | 1991-01-01 | Paper |
Searching by elimination Science of Computer Programming | 1990-01-01 | Paper |