| Publication | Date of Publication | Type |
|---|
| Public-key anamorphism in (CCA-secure) public-key encryption and beyond | 2024-12-04 | Paper |
| Sender-anamorphic encryption reformulated: achieving robust and generic constructions | 2024-09-13 | Paper |
| Anamorphic signatures: secrecy from a dictator who only permits authentication! | 2024-02-02 | Paper |
| Distributed computing in asynchronous networks with byzantine edges | 2024-01-29 | Paper |
| Scheduling task-tree with additive scales on parallel/distributed machines | 2023-12-12 | Paper |
| Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE | 2023-05-12 | Paper |
| Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary | 2023-05-08 | Paper |
| On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications | 2023-04-21 | Paper |
| Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption | 2023-03-21 | Paper |
| Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups | 2022-12-16 | Paper |
| Two-sided malicious security for private intersection-sum with cardinality | 2022-12-07 | Paper |
| Anamorphic encryption: private communication against a dictator | 2022-08-30 | Paper |
| Secure commitment against a powerful adversary | 2022-08-18 | Paper |
| The Combinatorics of Product Scanning Multiplication and Squaring | 2022-06-15 | Paper |
| Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
| A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes | 2021-02-23 | Paper |
| Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions | 2020-11-06 | Paper |
| The combinatorics of hidden diversity | 2020-02-20 | Paper |
| Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog | 2020-01-28 | Paper |
| One-message statistical Zero-Knowledge Proofs and space-bounded verifier | 2019-12-04 | Paper |
| Short vertex disjoint paths and multiconnectivity in random graphs: Reliable network computing | 2019-04-29 | Paper |
| Secure and efficient off-line digital money (extended abstract) | 2019-03-29 | Paper |
| Stochastic graphs have short memory: Fully dynamic connectivity in poly-log expected time | 2019-01-10 | Paper |
| Hard invalidation of electronic signatures | 2018-12-07 | Paper |
| Proactive secure multiparty computation with a dishonest majority | 2018-10-17 | Paper |
| Semantically secure anonymity: foundations of re-encryption | 2018-10-17 | Paper |
| Correcting subverted random oracles | 2018-09-26 | Paper |
| On characterizations of escrow encryption schemes | 2018-07-04 | Paper |
| Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs | 2018-05-09 | Paper |
| Sliding encryption: A cryptographic tool for mobile agents | 2018-05-09 | Paper |
| End-to-end design of a PUF-based privacy preserving authentication protocol | 2018-02-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4598166 | 2017-12-19 | Paper |
| Brief Announcement | 2017-10-11 | Paper |
| Coins, weights and contention in balancing networks | 2017-09-29 | Paper |
| Brief Announcement | 2017-09-29 | Paper |
| Time-optimal message-efficient work performance in the presence of faults | 2017-09-29 | Paper |
| Resource-based corruptions and the combinatorics of hidden diversity | 2017-05-16 | Paper |
| Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract) | 2017-04-10 | Paper |
| Cliptography: Clipping the Power of Kleptographic Attacks | 2017-01-06 | Paper |
| Proactive Secret Sharing with a Dishonest Majority | 2016-10-21 | Paper |
| On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs | 2016-10-21 | Paper |
| How to share a function securely | 2016-09-01 | Paper |
| Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares | 2016-08-31 | Paper |
| Compactly Hiding Linear Spans | 2016-06-10 | Paper |
| Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack | 2016-05-02 | Paper |
| Towards a Unified Security Model for Physically Unclonable Functions | 2016-04-08 | Paper |
| Concurrent knowledge extraction in public-key models | 2016-04-07 | Paper |
| Efficient and secure authenticated key exchange using weak passwords | 2015-12-07 | Paper |
| The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone? | 2015-11-11 | Paper |
| Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers | 2015-11-11 | Paper |
| Scalable public-key tracing and revoking | 2015-09-04 | Paper |
| Born and raised distributively | 2015-09-03 | Paper |
| A Little Honesty Goes a Long Way | 2015-07-06 | Paper |
| How to withstand mobile virus attacks (extended abstract) | 2015-06-19 | Paper |
| CONNECTIVITY PROPERTIES IN RANDOM REGULAR GRAPHS WITH EDGE FAULTS | 2015-04-29 | Paper |
| Order-Preserving Encryption Secure Beyond One-Wayness | 2015-01-06 | Paper |
| Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption | 2014-10-14 | Paper |
| On zero-knowledge proofs (extended abstract) | 2014-09-26 | Paper |
| Complete characterization of security notions for probabilistic private-key encryption | 2014-09-26 | Paper |
| Multi-Authority Secret-Ballot Elections with Linear Work | 2014-08-20 | Paper |
| Sequential Aggregate Signatures Made Shorter | 2014-01-24 | Paper |
| Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency | 2013-12-10 | Paper |
| Linearly Homomorphic Structure-Preserving Signatures and Their Applications | 2013-09-17 | Paper |
| Strictly-Black-Box Zero-Knowledge and Efficient Validation of Financial Transactions | 2013-08-12 | Paper |
| Scalable public-key tracing and revoking | 2013-06-07 | Paper |
| Adaptively secure non-interactive threshold cryptosystems | 2013-06-06 | Paper |
| Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems | 2013-01-07 | Paper |
| Efficient robust private set intersection | 2012-11-16 | Paper |
| On the Centrality of Off-Line E-Cash to Concrete Partial Information Games | 2012-09-25 | Paper |
| Group Signatures with Almost-for-Free Revocation | 2012-09-25 | Paper |
| Multi-location Leakage Resilient Cryptography | 2012-07-20 | Paper |
| Scalable Group Signatures with Revocation | 2012-06-29 | Paper |
| Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions | 2012-06-15 | Paper |
| Fully Forward-Secure Group Signatures | 2012-06-08 | Paper |
| Leakage Resilient Strong Key-Insulated Signatures in Public Channel | 2011-12-07 | Paper |
| Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge | 2011-12-02 | Paper |
| Adaptively Secure Non-interactive Threshold Cryptosystems | 2011-07-07 | Paper |
| On the Security of Hash Functions Employing Blockcipher Postprocessing | 2011-07-07 | Paper |
| Efficient Circuit-Size Independent Public Key Encryption with KDM Security | 2011-05-27 | Paper |
| Signatures Resilient to Continual Leakage on Memory and Computation | 2011-05-19 | Paper |
| The Dark Side of Threshold Cryptography | 2011-04-20 | Paper |
| Breaking and Repairing Asymmetric Public-Key Traitor Tracing | 2011-03-18 | Paper |
| Efficient traceable signatures in the standard model | 2011-03-14 | Paper |
| Leakage-Resilient RFID Authentication with Forward-Privacy | 2011-01-14 | Paper |
| A New Framework for RFID Privacy | 2010-09-20 | Paper |
| Kleptography from Standard Assumptions and Applications | 2010-09-10 | Paper |
| Efficient Completely Non-malleable Public Key Encryption | 2010-09-07 | Paper |
| Concurrent Knowledge Extraction in the Public-Key Model | 2010-09-07 | Paper |
| The Vector-Ballot Approach for Online Voting Procedures | 2010-06-17 | Paper |
| Cryptography between Wonderland and Underland | 2010-06-01 | Paper |
| Computer Aided Verification | 2010-03-31 | Paper |
| Computer Aided Verification | 2010-03-31 | Paper |
| Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs | 2010-02-24 | Paper |
| Secure Multi-party Computation Minimizing Online Rounds | 2009-12-15 | Paper |
| Group Encryption: Non-interactive Realization in the Standard Model | 2009-12-15 | Paper |
| On Monotone Formula Composition of Perfect Zero-Knowledge Languages | 2009-08-20 | Paper |
| Efficient Traceable Signatures in the Standard Model | 2009-08-18 | Paper |
| Secure Function Collection with Sublinear Storage | 2009-07-14 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks | 2009-05-12 | Paper |
| A New Randomness Extraction Paradigm for Hybrid Encryption | 2009-05-12 | Paper |
| On the Portability of Generalized Schnorr Proofs | 2009-05-12 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Key Evolution Systems in Untrusted Update Environments | 2009-04-29 | Paper |
| Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs | 2009-04-29 | Paper |
| Preimage Attack on the Parallel FFT-Hashing Function | 2009-03-06 | Paper |
| Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes | 2009-02-24 | Paper |
| Fair Traceable Multi-Group Signatures | 2009-02-12 | Paper |
| A Timing-Resistant Elliptic Curve Backdoor in RSA | 2009-02-10 | Paper |
| Efficient Intrusion-Resilient Signatures Without Random Oracles | 2009-01-15 | Paper |
| Privacy Preserving Data Mining within Anonymous Credential Systems | 2008-11-20 | Paper |
| Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination | 2008-09-09 | Paper |
| Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers | 2008-07-08 | Paper |
| The Security of Elastic Block Ciphers Against Key-Recovery Attacks | 2008-06-24 | Paper |
| Group Encryption | 2008-05-15 | Paper |
| Two-Party Computing with Encrypted Data | 2008-05-15 | Paper |
| Group Signatures with Efficient Concurrent Join | 2008-05-06 | Paper |
| Eavesdropping games | 2008-05-05 | Paper |
| Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding | 2008-04-24 | Paper |
| Secret Swarm Unit Reactive k −Secret Sharing | 2008-04-11 | Paper |
| K-Anonymous Multi-party Secret Handshakes | 2008-03-07 | Paper |
| Recovering NTRU Secret Key from Inversion Oracles | 2008-03-05 | Paper |
| Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model | 2007-11-29 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| A Space Efficient Backdoor in RSA and Its Applications | 2007-11-15 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice | 2007-09-20 | Paper |
| Parallel Key-Insulated Public Key Encryption Without Random Oracles | 2007-09-04 | Paper |
| Decoding interleaved Reed-Solomon codes over noisy channels | 2007-07-16 | Paper |
| Scalable protocols for authenticated group key exchange | 2007-05-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3433910 | 2007-04-23 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Information Security | 2006-10-20 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Characterization of security notions for probabilistic private-key encryption | 2006-08-14 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Secure Hypergraphs: Privacy from Partial Broadcast | 2005-09-16 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice | 2005-08-12 | Paper |
| Financial Cryptography | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4817524 | 2004-09-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4818870 | 2004-09-24 | Paper |
| Incremental Unforgeable Encryption | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4739521 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4738936 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737160 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737236 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737263 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043933 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4736427 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472061 | 2004-08-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4452576 | 2004-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4452585 | 2004-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4448392 | 2004-02-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450757 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4449167 | 2004-02-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434903 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418524 | 2003-08-10 | Paper |
| Strong Key-Insulated Signature Schemes | 2003-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414266 | 2003-07-24 | Paper |
| Crypto-integrity | 2003-07-16 | Paper |
| Threshold Cryptosystems Based on Factoring | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4797797 | 2003-03-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536272 | 2003-03-07 | Paper |
| Adaptively secure distributed public-key systems. | 2003-01-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783720 | 2002-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536292 | 2002-11-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536287 | 2002-11-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724599 | 2002-10-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149675 | 2002-09-30 | Paper |
| Self-Stabilizing Symmetry Breaking in Constant Space | 2002-09-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4542590 | 2002-08-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724439 | 2002-07-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4496064 | 2002-07-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536198 | 2002-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4535074 | 2002-06-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941201 | 2002-04-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707407 | 2002-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2762910 | 2002-01-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724602 | 2001-07-12 | Paper |
| Perfect zero-knowledge arguments for NP using any one-way permutation | 2001-05-20 | Paper |
| Robust parallel computations through randomization | 2001-04-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4938769 | 2001-01-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502497 | 2000-09-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4950053 | 2000-08-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941806 | 2000-08-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249271 | 2000-06-29 | Paper |
| Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic | 2000-05-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4950054 | 2000-05-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4950051 | 2000-05-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4252758 | 2000-04-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4263442 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4263444 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4934711 | 2000-01-31 | Paper |
| Auto-recoverable auto-certifiable cryptosystems | 1999-09-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4318694 | 1999-08-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4234049 | 1999-07-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4228505 | 1999-05-18 | Paper |
| Perfectly secure key distribution for dynamic conferences | 1999-03-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4381399 | 1999-01-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3840080 | 1998-12-14 | Paper |
| Scheduling task-trees with additive scales on parallel/distributed machines | 1998-07-22 | Paper |
| The local detection paradigm and its applications to self-stabilization | 1998-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373608 | 1998-06-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364541 | 1998-02-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3840073 | 1998-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3840171 | 1998-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3840086 | 1998-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343442 | 1997-12-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4365729 | 1997-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364557 | 1997-11-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364569 | 1997-11-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343437 | 1997-07-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343446 | 1997-07-06 | Paper |
| Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation | 1997-05-19 | Paper |
| Efficient On-Line Call Control Algorithms | 1997-04-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4875231 | 1996-10-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4858456 | 1996-05-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4858457 | 1996-05-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4318714 | 1995-08-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4318716 | 1995-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279566 | 1994-09-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4287362 | 1994-04-12 | Paper |
| Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems | 1994-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279573 | 1994-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3138871 | 1994-01-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3138950 | 1993-10-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4036897 | 1993-05-18 | Paper |
| Weaknesses of Undeniable Signature Schemes | 1993-05-18 | Paper |
| Perfectly secure message transmission | 1993-05-16 | Paper |
| Maintenance of a minimum spanning forest in a dynamic plane graph | 1992-06-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5751936 | 1991-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3210144 | 1991-01-01 | Paper |
| Constant-round perfect zero-knowledge computationally convincing protocols | 1991-01-01 | Paper |
| The power of multimedia: Combining point-to-point and multi-access networks | 1990-01-01 | Paper |
| Fast algorithms for edge-coloring planar graphs | 1989-01-01 | Paper |
| Minimum-Knowledge Interactive Proofs for Decision Problems | 1989-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3806831 | 1988-01-01 | Paper |
| Distributed algorithms in synchronous broadcasting networks | 1987-01-01 | Paper |
| Partitioned encryption and achieving simultaneity by partitioning | 1987-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3753460 | 1985-01-01 | Paper |