| Publication | Date of Publication | Type |
|---|
Mangrove: a scalable framework for folding-based SNARKs | 2025-01-10 | Paper |
Traceable secret sharing: strong security and efficient constructions | 2024-12-13 | Paper |
Accountability for misbehavior in threshold decryption via threshold traitor tracing | 2024-12-13 | Paper |
Cryptoeconomic security for data availability committees | 2024-07-17 | Paper |
Arithmetic sketching Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
A lower bound on the length of signatures based on group actions and generic isogenies Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
HyperPlonk: Plonk with linear-time prover and high-degree custom gates Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Threshold signatures with private accountability Advances in Cryptology – CRYPTO 2022 | 2023-07-07 | Paper |
Oblivious pseudorandom functions from isogenies | 2023-03-21 | Paper |
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes | 2022-07-01 | Paper |
\textsf{Halo Infinite}: proof-carrying data from additive polynomial commitments | 2022-03-31 | Paper |
Supersingular curves with small noninteger endomorphisms Open Book Series | 2021-03-11 | Paper |
Zether: towards privacy in a smart contract world | 2021-02-08 | Paper |
An airdrop that preserves recipient privacy | 2021-02-08 | Paper |
Multiparty non-interactive key exchange and more from isogenies on elliptic curves Journal of Mathematical Cryptology | 2020-06-24 | Paper |
Batching techniques for accumulators with applications to IOPs and stateless blockchains | 2020-05-20 | Paper |
Zero-knowledge proofs on secret-shared data via fully linear PCPs | 2020-03-09 | Paper |
Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security | 2020-03-02 | Paper |
Post-quantum EPID signatures from symmetric primitives | 2020-01-28 | Paper |
Compact multi-signatures for smaller blockchains | 2019-01-23 | Paper |
Exploring crypto dark matter: new simple PRF candidates and their applications | 2018-12-06 | Paper |
Verifiable delay functions | 2018-09-12 | Paper |
Quasi-optimal SNARGs via linear multi-prover interactive proofs | 2018-07-17 | Paper |
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation Algorithmica | 2018-01-05 | Paper |
Lattice-based SNARGs and their application to more efficient obfuscation Lecture Notes in Computer Science | 2017-06-23 | Paper |
Constraining pseudorandom functions privately Lecture Notes in Computer Science | 2017-06-13 | Paper |
Surnaming schemes, fast verification, and applications to SGX technology Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Balloon hashing: a memory-hard function providing provable protection against sequential attacks Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Targeted malleability: homomorphic encryption for restricted computations Proceedings of the 3rd Innovations in Theoretical Computer Science Conference | 2016-10-07 | Paper |
Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Algorithms for black-box fields and their application to cryptography Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Hosting services on an untrusted cloud Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Oblivious signature-based envelope Proceedings of the twenty-second annual symposium on Principles of distributed computing | 2015-09-04 | Paper |
scientific article; zbMATH DE number 6472645 (Why is no real title available?) | 2015-08-14 | Paper |
Computing on authenticated data Journal of Cryptology | 2015-05-12 | Paper |
Bivariate polynomials modulo composites and their applications Lecture Notes in Computer Science | 2015-01-16 | Paper |
Finding smooth integers in short intervals using CRT decoding Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Low overhead broadcast encryption from multilinear maps Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Private database queries using somewhat homomorphic encryption Applied Cryptography and Network Security | 2014-01-24 | Paper |
Function-private subspace-membership encryption and its applications Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Constrained pseudorandom functions and their applications Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Secure signatures and chosen ciphertext security in a quantum computing world Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Function-private identity-based encryption: hiding the function in functional encryption Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Key homomorphic PRFs and their applications Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Message-Locked Encryption for Lock-Dependent Messages Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Oblivious signature-based envelope Distributed Computing | 2013-06-07 | Paper |
Quantum-secure message authentication codes Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Pairing-based cryptography: past, present, and future Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Computing on Authenticated Data Theory of Cryptography | 2012-06-15 | Paper |
Efficient selective identity-based encryption without random oracles Journal of Cryptology | 2012-01-13 | Paper |
Random oracles in a quantum world Lecture Notes in Computer Science | 2011-12-02 | Paper |
Homomorphic signatures for polynomial functions Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Functional encryption: definitions and challenges Theory of Cryptography | 2011-05-19 | Paper |
Finding composite order ordinary elliptic curves using the Cocks-Pinch method Journal of Number Theory | 2011-04-08 | Paper |
Attacking an obfuscated cipher by injecting faults Lecture Notes in Computer Science | 2011-03-18 | Paper |
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Efficient lattice (H)IBE in the standard model Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Preventing pollution attacks in multi-source network coding Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
The design and implementation of protocol-based hidden key recovery Lecture Notes in Computer Science | 2010-02-09 | Paper |
Signing a Linear Subspace: Signature Schemes for Network Coding Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Public Key Encryption That Allows PIR Queries Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Circular-Secure Encryption from Decision Diffie-Hellman Lecture Notes in Computer Science | 2009-02-10 | Paper |
Generalized Identity Based and Broadcast Encryption Schemes Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Financial Cryptography and Data Security | 2008-09-09 | Paper |
Short signatures without random oracles and the SDH assumption in bilinear groups Journal of Cryptology | 2008-05-06 | Paper |
Hierarchical Identity Based Encryption with Constant Size Ciphertext Lecture Notes in Computer Science | 2008-05-06 | Paper |
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Efficient generation of shared RSA keys Journal of the ACM | 2008-02-11 | Paper |
Bilinear Groups of Composite Order Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Chosen‐Ciphertext Security from Identity‐Based Encryption SIAM Journal on Computing | 2007-10-22 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions Lecture Notes in Computer Science | 2007-09-04 | Paper |
Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography | 2007-08-30 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Short signatures from the Weil pairing Journal of Cryptology | 2005-04-15 | Paper |
scientific article; zbMATH DE number 2102669 (Why is no real title available?) | 2004-09-24 | Paper |
scientific article; zbMATH DE number 2081084 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2081057 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2009971 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 1996402 (Why is no real title available?) | 2003-10-22 | Paper |
On the importance of eliminating errors in cryptographic computations Journal of Cryptology | 2003-08-26 | Paper |
scientific article; zbMATH DE number 1962145 (Why is no real title available?) | 2003-08-10 | Paper |
Optimistic Mixing for Exit-Polls Lecture Notes in Computer Science | 2003-07-16 | Paper |
Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing | 2003-06-19 | Paper |
scientific article; zbMATH DE number 1842494 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1842497 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1842493 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1500479 (Why is no real title available?) | 2002-10-10 | Paper |
Finding smooth integers in short intervals using CRT decoding Journal of Computer and System Sciences | 2002-09-12 | Paper |
scientific article; zbMATH DE number 1759782 (Why is no real title available?) | 2002-08-06 | Paper |
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring Information Processing Letters | 2002-07-25 | Paper |
scientific article; zbMATH DE number 1722689 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1617915 (Why is no real title available?) | 2001-07-12 | Paper |
scientific article; zbMATH DE number 1583952 (Why is no real title available?) | 2001-07-08 | Paper |
scientific article; zbMATH DE number 1583767 (Why is no real title available?) | 2001-07-03 | Paper |
Cryptanalysis of RSA with Private Key d Less than N 0.292 Advances in Cryptology — EUROCRYPT ’99 | 2000-11-26 | Paper |
Cryptanalysis of RSA with private key d less than N/sup 0.292/ IEEE Transactions on Information Theory | 2000-09-07 | Paper |
scientific article; zbMATH DE number 1408369 (Why is no real title available?) | 2000-08-23 | Paper |
scientific article; zbMATH DE number 1418304 (Why is no real title available?) | 2000-07-19 | Paper |
scientific article; zbMATH DE number 1418303 (Why is no real title available?) | 2000-03-19 | Paper |
Collusion-secure fingerprinting for digital data IEEE Transactions on Information Theory | 1999-11-21 | Paper |
Breaking RSA may not be equivalent to factoring Lecture Notes in Computer Science | 1999-10-10 | Paper |
scientific article; zbMATH DE number 1241364 (Why is no real title available?) | 1999-08-23 | Paper |
scientific article; zbMATH DE number 1302812 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1258344 (Why is no real title available?) | 1999-03-08 | Paper |
scientific article; zbMATH DE number 1241372 (Why is no real title available?) | 1999-01-17 | Paper |
scientific article; zbMATH DE number 1186946 (Why is no real title available?) | 1998-11-05 | Paper |
scientific article; zbMATH DE number 1186931 (Why is no real title available?) | 1998-01-01 | Paper |
scientific article; zbMATH DE number 1088251 (Why is no real title available?) | 1997-11-17 | Paper |
scientific article; zbMATH DE number 1030976 (Why is no real title available?) | 1997-07-06 | Paper |
scientific article; zbMATH DE number 1030974 (Why is no real title available?) | 1997-07-06 | Paper |
On the computational power of DNA Discrete Applied Mathematics | 1997-04-21 | Paper |