| Publication | Date of Publication | Type |
|---|
| Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing | 2024-12-11 | Paper |
| Anonymous broadcast authentication with logarithmic-order ciphertexts from LWE | 2024-06-05 | Paper |
| A Tightly Secure Identity-Based Signature Scheme from Isogenies | 2024-04-26 | Paper |
| Authenticated encryption for very short inputs | 2023-10-04 | Paper |
| Group testing aggregate signatures with soundness | 2023-08-21 | Paper |
| Identity-based interactive aggregate signatures from lattices | 2023-08-21 | Paper |
| Non-adaptive Group-Testing Aggregate MAC Scheme | 2023-06-30 | Paper |
| Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication | 2023-06-20 | Paper |
| Asymptotically tight lower bounds in anonymous broadcast encryption and authentication | 2022-06-29 | Paper |
| Quantum-secure (non-)sequential aggregate message authentication codes | 2020-05-06 | Paper |
| SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model | 2020-05-06 | Paper |
| History-free sequential aggregate MAC revisited | 2020-01-10 | Paper |
| Identity-based encryption with hierarchical key-insulation in the standard model | 2019-05-17 | Paper |
| CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance | 2018-11-26 | Paper |
| Generic construction of sequential aggregate MACs from any MACs | 2018-11-07 | Paper |
| Signcryption with quantum random oracles | 2018-11-07 | Paper |
| Lower bounds on lattice enumeration with extreme pruning | 2018-09-26 | Paper |
| Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography | 2018-06-27 | Paper |
| Lattice-based signcryption without random oracles | 2018-06-22 | Paper |
| Timed-release computational secret sharing and threshold encryption | 2018-01-26 | Paper |
| Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness | 2017-01-06 | Paper |
| Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles | 2016-04-13 | Paper |
| Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage | 2016-01-27 | Paper |
| A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer | 2016-01-12 | Paper |
| Constructions of CCA-Secure Revocable Identity-Based Encryption | 2015-10-20 | Paper |
| Information-theoretically secure entity authentication in the multi-user setting | 2015-10-16 | Paper |
| Information Theoretic Security for Encryption Based on Conditional Rényi Entropies | 2015-09-30 | Paper |
| Timed-release computational secret sharing scheme and its applications | 2015-09-29 | Paper |
| Timed-release secret sharing schemes with information theoretic security | 2015-09-21 | Paper |
| Constructions of signcryption in the multi-user setting from identity-based encryption | 2014-01-17 | Paper |
| Information-theoretic timed-release security: key-agreement, encryption, and authentication codes | 2012-11-06 | Paper |
| Constructing secure hybrid encryption from key encapsulation mechanism with authenticity | 2011-12-16 | Paper |
| Bit commitment in the bounded storage model: tight bound and simple optimal construction | 2011-12-16 | Paper |
| Information-theoretically secure key-insulated multireceiver authentication codes | 2010-05-04 | Paper |
| Systematic treatment of collusion secure codes: security definitions and their relations | 2010-02-09 | Paper |
| The role of arbiters in asymmetric authentication schemes | 2010-02-09 | Paper |
| Unconditionally secure blind signatures | 2009-12-03 | Paper |
| Construction methodology of unconditionally secure signature schemes | 2009-12-03 | Paper |
| Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment | 2009-06-09 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM | 2009-03-06 | Paper |
| Unconditionally Secure Steganography Against Active Attacks | 2009-02-24 | Paper |
| Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application | 2008-03-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737262 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043927 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4428331 | 2003-09-15 | Paper |
| Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks | 2003-07-27 | Paper |
| Unconditionally Secure Anonymous Encryption and Group Authentication | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408444 | 2003-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707409 | 2002-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502490 | 2002-01-27 | Paper |
| Comparing the MOV and FR Reductions in Elliptic Curve Cryptography | 2000-06-07 | Paper |