| Publication | Date of Publication | Type |
|---|
Efficient NIZKs and signatures from commit-and-open protocols in the QROM Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Efficient NIZKs and signatures from commit-and-open protocols in the QROM Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
| The Value of Flexibility in a Carbon Neutral Power System | 2022-11-24 | Paper |
Online-extractability in the quantum random-oracle model (available as arXiv preprint) | 2022-08-30 | Paper |
Impossibility of quantum virtual black-box obfuscation of classical circuits (available as arXiv preprint) | 2022-03-31 | Paper |
Secure multi-party quantum computation with a dishonest majority (available as arXiv preprint) | 2021-12-01 | Paper |
| Secure multi-party quantum computation with a dishonest majority | 2021-12-01 | Paper |
| Non-interactive cryptographic timestamping based on verifiable delay functions | 2021-02-08 | Paper |
| High Resolution Generation Expansion Planning Considering Flexibility Needs: The Case of Switzerland in 2030 | 2021-01-05 | Paper |
Security of the Fiat-Shamir transformation in the quantum random-oracle model (available as arXiv preprint) | 2020-03-09 | Paper |
| Quantum indistinguishability of random sponges | 2020-03-09 | Paper |
| A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model | 2018-07-17 | Paper |
| Post-quantum security of the sponge construction | 2018-06-22 | Paper |
Quantum homomorphic encryption for polynomial-size circuits Theory of Computing | 2018-06-15 | Paper |
Quantum fully homomorphic encryption with verification (available as arXiv preprint) | 2018-04-06 | Paper |
| Recent developments in quantum cryptography | 2018-01-09 | Paper |
The Operational Meaning of Min- and Max-Entropy IEEE Transactions on Information Theory | 2017-08-08 | Paper |
The garden-hose model Proceedings of the 4th conference on Innovations in Theoretical Computer Science | 2017-05-16 | Paper |
Multiparty Zero-Error Classical Channel Coding With Entanglement IEEE Transactions on Information Theory | 2017-04-28 | Paper |
On the parallel repetition of multi-player games: the no-signaling case (available as arXiv preprint) | 2017-03-13 | Paper |
Computational Security of Quantum Encryption Lecture Notes in Computer Science | 2017-01-06 | Paper |
Semantic security and indistinguishability in the quantum world Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Quantum homomorphic encryption for polynomial-sized circuits Lecture Notes in Computer Science | 2016-11-09 | Paper |
Quantum cryptography beyond quantum key distribution Designs, Codes and Cryptography | 2016-02-02 | Paper |
An all-but-one entropic uncertainty relation, and application to password-based identification Theory of Quantum Computation, Communication, and Cryptography | 2015-12-03 | Paper |
Quantifying the leakage of quantum protocols for classical two-party cryptography (available as arXiv preprint) | 2015-10-09 | Paper |
Quantifying the leakage of quantum protocols for classical two-party cryptography International Journal of Quantum Information | 2015-02-24 | Paper |
Secure identification and QKD in the bounded-quantum-storage model Theoretical Computer Science | 2014-12-02 | Paper |
Position-based quantum cryptography: impossibility and constructions SIAM Journal on Computing | 2014-06-04 | Paper |
Random oracles in a quantum world Lecture Notes in Computer Science | 2011-12-02 | Paper |
Position-based quantum cryptography: impossibility and constructions Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Robust cryptography in the noisy-quantum-storage model (available as arXiv preprint) | 2010-02-05 | Paper |
On the power of two-party quantum cryptography Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Improving the Security of Quantum Protocols via Commit-and-Open Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Secure Identification and QKD in the Bounded-Quantum-Storage Model Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Composing Quantum Protocols in a Classical Environment Theory of Cryptography | 2009-03-03 | Paper |
Cryptography in the Bounded-Quantum-Storage Model SIAM Journal on Computing | 2008-12-22 | Paper |
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker Theory of Cryptography | 2008-03-05 | Paper |
Information-Theoretic Conditions for Two-Party Secure Function Evaluation Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Oblivious Transfer and Linear Functions Lecture Notes in Computer Science | 2007-09-04 | Paper |