| Publication | Date of Publication | Type |
|---|
Secure and efficient off-line digital money (extended abstract) Automata, Languages and Programming | 2019-03-29 | Paper |
Optimal Coding for Streaming Authentication and Interactive Communication IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Low-exponent RSA with related messages Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Multi-authority secret-ballot elections with linear work Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Practical dual-receiver encryption. Soundness, complete non-malleability, and applications Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Unique Ring Signatures: A Practical Construction 1524.94081 | 2013-11-12 | Paper |
Unique group signatures Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Optimal coding for streaming authentication and interactive communication Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Fair threshold decryption with semi-trusted third parties International Journal of Applied Cryptography | 2011-04-05 | Paper |
Efficient and Secure Evaluation of Multivariate Polynomials and Applications Applied Cryptography and Network Security | 2010-07-06 | Paper |
Fair Threshold Decryption with Semi-Trusted Third Parties Information Security and Privacy | 2009-06-25 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Communication-Efficient Private Protocols for Longest Common Subsequence Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Edge Eavesdropping Games Lecture Notes in Computer Science | 2008-11-27 | Paper |
Multi-party Indirect Indexing and Applications Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Eavesdropping games Journal of the ACM | 2008-05-05 | Paper |
Improved Efficiency for Private Stable Matching Lecture Notes in Computer Science | 2008-04-17 | Paper |
Efficient generation of shared RSA keys Journal of the ACM | 2008-02-11 | Paper |
Secure Linear Algebra Using Linearly Recurrent Sequences Theory of Cryptography | 2007-08-30 | Paper |
Towards Optimal and Efficient Perfectly Secure Message Transmission Theory of Cryptography | 2007-08-30 | Paper |
Weakly-Private Secret Sharing Schemes Theory of Cryptography | 2007-08-30 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Byzantine agreement given partial broadcast Journal of Cryptology | 2006-09-12 | Paper |
Secure Hypergraphs: Privacy from Partial Broadcast SIAM Journal on Discrete Mathematics | 2005-09-16 | Paper |
Mutual search Journal of the ACM | 2005-01-25 | Paper |
scientific article; zbMATH DE number 1962140 (Why is no real title available?) | 2003-08-10 | Paper |
Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing | 2003-06-19 | Paper |
scientific article; zbMATH DE number 1842494 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1722689 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1676633 (Why is no real title available?) | 2001-11-25 | Paper |
scientific article; zbMATH DE number 1583792 (Why is no real title available?) | 2001-07-03 | Paper |
scientific article; zbMATH DE number 1418304 (Why is no real title available?) | 2000-07-19 | Paper |
Secure communication in minimal connectivity models Journal of Cryptology | 2000-05-08 | Paper |
scientific article; zbMATH DE number 1263179 (Why is no real title available?) | 1999-07-22 | Paper |
Reliable communication over partially authenticated networks Theoretical Computer Science | 1999-06-21 | Paper |
scientific article; zbMATH DE number 1303134 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1303590 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1088904 (Why is no real title available?) | 1997-11-18 | Paper |
scientific article; zbMATH DE number 1088251 (Why is no real title available?) | 1997-11-17 | Paper |
scientific article; zbMATH DE number 1024062 (Why is no real title available?) | 1997-09-24 | Paper |
Joint encryption and message-efficient secure computation Journal of Cryptology | 1997-06-30 | Paper |
scientific article; zbMATH DE number 826070 (Why is no real title available?) | 1996-05-27 | Paper |