| Publication | Date of Publication | Type |
|---|
| Quantum state group actions | 2026-02-04 | Paper |
| On one-shot signatures, quantum vs. classical binding, and obfuscating permutations | 2026-02-04 | Paper |
| Translating between the common Haar random state model and the unitary model | 2026-02-04 | Paper |
| How to model unitary oracles | 2026-02-04 | Paper |
| Hard quantum extrapolations in quantum cryptography | 2025-12-02 | Paper |
| Adaptive security in SNARGs via iO and lossy functions | 2025-01-10 | Paper |
| Limits on the power of prime-order groups: separating Q-type from static assumptions | 2024-12-13 | Paper |
Full quantum equivalence of group action DLog and CDH, and more Journal of Cryptology | 2024-11-15 | Paper |
| The relationship between idealized models under computationally bounded adversaries | 2024-09-13 | Paper |
| Multi-instance randomness extraction and security against bounded-storage mass surveillance | 2024-08-02 | Paper |
| Commitments to quantum states | 2024-05-08 | Paper |
Computational wiretap coding from indistinguishability obfuscation Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Tracing quantum state distinguishers via backtracking Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Another round of breaking and making quantum money: how to not build it from lattices, and more Advances in Cryptology – EUROCRYPT 2023 | 2024-01-16 | Paper |
A lower bound on the length of signatures based on group actions and generic isogenies Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Full quantum equivalence of group action DLog and CDH, and more Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Adaptive multiparty NIKE Theory of Cryptography | 2023-08-14 | Paper |
Collusion resistant copy-protection for watermarkable functionalities Theory of Cryptography | 2023-08-14 | Paper |
To label, or not to label (in generic groups) Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
Augmented random oracles Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
New constructions of collapsing hashes Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
On the feasibility of unclonable encryption, and more Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Franchised quantum money Lecture Notes in Computer Science | 2023-05-12 | Paper |
Redeeming reset indifferentiability and applications to post-quantum security Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Disappearing cryptography in the bounded storage model | 2023-04-13 | Paper |
| scientific article; zbMATH DE number 7650430 (Why is no real title available?) | 2023-02-03 | Paper |
How to Construct Quantum Random Functions Journal of the ACM | 2022-12-08 | Paper |
| Indifferentiability for public key cryptosystems | 2022-11-09 | Paper |
| New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings | 2022-11-09 | Paper |
Quantum algorithms for variants of average-case lattice problems via filtering (available as arXiv preprint) | 2022-08-30 | Paper |
| Incompressible cryptography | 2022-08-30 | Paper |
| White box traitor tracing | 2022-05-18 | Paper |
New approaches for quantum copy-protection (available as arXiv preprint) | 2022-03-31 | Paper |
Hidden cosets and applications to unclonable cryptography (available as arXiv preprint) | 2022-03-31 | Paper |
| Schrödinger's pirate: how to trace a quantum decoder | 2022-03-23 | Paper |
| Classical vs quantum random oracles | 2021-12-08 | Paper |
| Towards non-interactive witness hiding | 2021-12-01 | Paper |
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness Journal of Cryptology | 2021-08-10 | Paper |
Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions Journal of Cryptology | 2021-04-07 | Paper |
One-shot signatures and applications to hybrid quantum/classical authentication Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing | 2021-01-19 | Paper |
Multiparty non-interactive key exchange and more from isogenies on elliptic curves Journal of Mathematical Cryptology | 2020-06-24 | Paper |
| The distinction between fixed and random generators in group-based assumptions | 2020-03-09 | Paper |
| How to record quantum queries, and applications to quantum indifferentiability | 2020-03-09 | Paper |
| Revisiting post-quantum Fiat-Shamir | 2020-03-09 | Paper |
| New techniques for obfuscating conjunctions | 2020-02-04 | Paper |
On finding quantum multi-collisions (available as arXiv preprint) | 2020-02-04 | Paper |
Quantum lightning never strikes the same state twice (available as arXiv preprint) | 2020-02-04 | Paper |
| On ELFs, deterministic encryption, and correlated-input security | 2020-02-04 | Paper |
The magic of ELFs Journal of Cryptology | 2019-08-13 | Paper |
| Parameter-hiding order revealing encryption | 2018-12-20 | Paper |
| Impossibility of order-revealing encryption in idealized models | 2018-12-06 | Paper |
| The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks | 2018-12-06 | Paper |
| Return of GGH15: provable security against zeroizing attacks | 2018-12-06 | Paper |
Cutting-edge cryptography through the lens of secret sharing Information and Computation | 2018-12-03 | Paper |
Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness Theory of Cryptography | 2018-01-19 | Paper |
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation Algorithmica | 2018-01-05 | Paper |
New security notions and feasibility results for authentication of quantum data (available as arXiv preprint) | 2017-11-15 | Paper |
Breaking the sub-exponential barrier in obfustopia Lecture Notes in Computer Science | 2017-06-23 | Paper |
How to Generate and Use Universal Samplers Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Secure Obfuscation in a Weak Multilinear Map Model Theory of Cryptography | 2016-12-22 | Paper |
Strong hardness of privacy from weak traitor tracing Theory of Cryptography | 2016-12-21 | Paper |
The Magic of ELFs Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Anonymous traitor tracing: how to embed arbitrary information in a key Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Functional encryption without obfuscation Theory of Cryptography | 2016-04-08 | Paper |
How to avoid obfuscation using witness PRFs Theory of Cryptography | 2016-04-08 | Paper |
Cutting-edge cryptography through the lens of secret sharing Theory of Cryptography | 2016-04-08 | Paper |
Order-revealing encryption and the hardness of private learning Theory of Cryptography | 2016-03-23 | Paper |
| scientific article; zbMATH DE number 6492475 (Why is no real title available?) | 2015-10-09 | Paper |
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Low overhead broadcast encryption from multilinear maps Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Secure signatures and chosen ciphertext security in a quantum computing world Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Quantum-secure message authentication codes Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Secure identity-based encryption in the quantum random oracle model Lecture Notes in Computer Science | 2012-09-25 | Paper |
Random oracles in a quantum world Lecture Notes in Computer Science | 2011-12-02 | Paper |