| Publication | Date of Publication | Type |
|---|
| Modular design of KEM-based authenticated key exchange | 2024-01-11 | Paper |
Key Exchange Asymmetric Cryptography | 2023-08-04 | Paper |
Offline Assisted Group Key Exchange Developments in Language Theory | 2023-06-30 | Paper |
Symmetric Key Exchange with Full Forward Security and Robust Synchronization Lecture Notes in Computer Science | 2023-05-26 | Paper |
| Fast and secure updatable encryption | 2022-11-09 | Paper |
| On strengthening authentication protocols to foil cryptanalysis | 2021-12-20 | Paper |
| Designing secure key exchange protocols | 2021-12-20 | Paper |
A formal framework for authentication Computer Security — ESORICS 92 | 2021-04-07 | Paper |
| A blind coupon mechanism enabling veto voting over unreliable networks | 2020-05-12 | Paper |
| Secure channels and termination: the last word on TLS | 2020-03-02 | Paper |
Protocols for authentication and key establishment Information Security and Cryptography | 2019-10-10 | Paper |
| Security notions for cloud storage and deduplication | 2018-11-07 | Paper |
| Key recovery: inert and public | 2017-10-23 | Paper |
From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Continuous after-the-fact leakage-resilient eCK-secure key exchange Cryptography and Coding | 2016-01-12 | Paper |
ASICS: Authenticated key exchange security incorporating certification systems Lecture Notes in Computer Science | 2014-10-16 | Paper |
Continuous After-the-Fact Leakage-Resilient Key Exchange Information Security and Privacy | 2014-07-24 | Paper |
Efficient modular exponentiation-based puzzles for denial-of-service protection Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Effort-release public-key encryption from cryptographic puzzles Information Security and Privacy | 2012-09-07 | Paper |
Minimizing information leakage of tree-based RFID authentication protocols using alternate tree-walking Information Security and Privacy | 2012-09-07 | Paper |
On Forward Secrecy in One-Round Key Exchange Cryptography and Coding | 2011-12-16 | Paper |
Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy Lecture Notes in Computer Science | 2011-12-16 | Paper |
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Delaying mismatched field multiplications in pairing computations Arithmetic of Finite Fields | 2010-07-20 | Paper |
Generic one round group key exchange in the standard model Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Efficient certificateless KEM in the standard model Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Avoiding full extension field arithmetic in pairing computations Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Strongly Secure Certificateless Key Agreement Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Faster Pairings on Special Weierstrass Curves Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Designing a secure e-tender submission protocol Electronic Commerce Research | 2009-05-29 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
One-round key exchange in the standard model International Journal of Applied Cryptography | 2009-05-12 | Paper |
Identity-based strong designated verifier signature schemes: attacks and new construction Computers and Electrical Engineering | 2009-04-17 | Paper |
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Computers and Electrical Engineering | 2009-04-17 | Paper |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems Cryptology and Network Security | 2009-01-09 | Paper |
| Applications of elliptic curve pairings in cryptography | 2008-07-21 | Paper |
Efficient One-Round Key Exchange in the Standard Model Information Security and Privacy | 2008-07-08 | Paper |
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Errors in Computational Complexity Proofs for Protocols Lecture Notes in Computer Science | 2008-03-18 | Paper |
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols Lecture Notes in Computer Science | 2008-03-18 | Paper |
An Efficient and Verifiable Solution to the Millionaire Problem Lecture Notes in Computer Science | 2008-03-17 | Paper |
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Verifier-Key-Flexible Universal Designated-Verifier Signatures Cryptography and Coding | 2008-03-07 | Paper |
On the Connection Between Signcryption and One-Pass Key Establishment Cryptography and Coding | 2008-03-07 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys Information Security and Privacy | 2007-09-07 | Paper |
A Novel Range Test Information Security and Privacy | 2007-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model Applicable Algebra in Engineering, Communication and Computing | 2006-09-12 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
A public key cryptosystem based on a subgroup membership problem Designs, Codes and Cryptography | 2005-11-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 2085424 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2080720 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2080707 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2080180 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2080176 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2080179 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2079930 (Why is no real title available?) | 2004-08-03 | Paper |
| scientific article; zbMATH DE number 2048535 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2043319 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1980956 (Why is no real title available?) | 2003-09-15 | Paper |
Round-Optimal Contributory Conference Key Agreement Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
| scientific article; zbMATH DE number 1950627 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1857525 (Why is no real title available?) | 2003-05-19 | Paper |
Protocols for authentification and key establishment Information Security and Cryptography | 2003-05-15 | Paper |
| scientific article; zbMATH DE number 1808249 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1808271 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1500492 (Why is no real title available?) | 2002-08-14 | Paper |
| scientific article; zbMATH DE number 1424188 (Why is no real title available?) | 2002-04-08 | Paper |
| scientific article; zbMATH DE number 1424161 (Why is no real title available?) | 2002-03-18 | Paper |
| scientific article; zbMATH DE number 1689605 (Why is no real title available?) | 2002-01-13 | Paper |
scientific article; zbMATH DE number 1925560 (Why is no real title available?) International Journal of Information Security | 2002-01-01 | Paper |
| scientific article; zbMATH DE number 1440060 (Why is no real title available?) | 2001-10-03 | Paper |
| scientific article; zbMATH DE number 1440073 (Why is no real title available?) | 2001-10-02 | Paper |
| scientific article; zbMATH DE number 1583769 (Why is no real title available?) | 2001-08-20 | Paper |
| scientific article; zbMATH DE number 1612529 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1612507 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1612508 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1500499 (Why is no real title available?) | 2000-09-04 | Paper |
| scientific article; zbMATH DE number 1394314 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1302800 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303959 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303975 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1182517 (Why is no real title available?) | 1998-10-28 | Paper |
| scientific article; zbMATH DE number 1189394 (Why is no real title available?) | 1998-10-08 | Paper |
| scientific article; zbMATH DE number 1107707 (Why is no real title available?) | 1998-08-28 | Paper |
| scientific article; zbMATH DE number 1107702 (Why is no real title available?) | 1998-07-03 | Paper |
| scientific article; zbMATH DE number 1024094 (Why is no real title available?) | 1997-06-18 | Paper |
| scientific article; zbMATH DE number 721893 (Why is no real title available?) | 1995-02-13 | Paper |
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 67079 (Why is no real title available?) | 1992-09-27 | Paper |
| scientific article; zbMATH DE number 4039974 (Why is no real title available?) | 1988-01-01 | Paper |
On the structure of the family of Cherry fields on the torus Ergodic Theory and Dynamical Systems | 1985-01-01 | Paper |
Residuation in semigroups of pre-closures Semigroup Forum | 1976-01-01 | Paper |
| scientific article; zbMATH DE number 3504076 (Why is no real title available?) | 1976-01-01 | Paper |