| Publication | Date of Publication | Type |
|---|
| Bare PAKE: universally composable key exchange from just passwords | 2024-12-04 | Paper |
| Formally verifying Kyber. Episode V: machine-checked IND-CCA security and correctness of ML-KEM in Easycrypt | 2024-12-04 | Paper |
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Machine-checked security for XMSS as in RFC 8391 and SPHINCS\textsuperscript{+} Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Algebraic adversaries in the universal composability framework Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Universally composable relaxed password authenticated key exchange | 2022-11-09 | Paper |
| Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data | 2022-08-25 | Paper |
| Provable security analysis of FIDO2 | 2022-04-22 | Paper |
A formal treatment of the role of verified compilers in secure computation Journal of Logical and Algebraic Methods in Programming | 2022-03-09 | Paper |
| Efficient function-hiding functional encryption: from inner-products to orthogonality | 2020-01-28 | Paper |
| Indifferentiable authenticated encryption | 2018-09-12 | Paper |
Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC Fast Software Encryption | 2018-05-09 | Paper |
Private functional encryption: indistinguishability-based definitions and constructions from obfuscation Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
The related-key analysis of Feistel constructions Fast Software Encryption | 2015-09-18 | Paper |
Formal verification of side-channel countermeasures using self-composition Science of Computer Programming | 2014-04-02 | Paper |
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption Cryptography and Coding | 2014-01-17 | Paper |
On the semantic security of functional encryption schemes Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Delegatable homomorphic encryption with applications to secure outsourcing of computation Lecture Notes in Computer Science | 2012-06-08 | Paper |
Practical realisation and elimination of an ECC-related software bug attack Lecture Notes in Computer Science | 2012-06-08 | Paper |
Strong Knowledge Extractors for Public-Key Encryption Schemes Information Security and Privacy | 2010-10-25 | Paper |
Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles Information Security and Privacy | 2010-10-25 | Paper |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Secure Biometric Authentication with Improved Accuracy Information Security and Privacy | 2008-07-08 | Paper |
Secure Cryptographic Workflow in the Standard Model Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Randomness Reuse: Extensions and Improvements Cryptography and Coding | 2008-03-07 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |