| Publication | Date of Publication | Type |
|---|
| Adaptive security in SNARGs via iO and lossy functions | 2025-01-10 | Paper |
| Limits on the power of prime-order groups: separating Q-type from static assumptions | 2024-12-13 | Paper |
| Full quantum equivalence of group action DLog and CDH, and more | 2024-11-15 | Paper |
| The relationship between idealized models under computationally bounded adversaries | 2024-09-13 | Paper |
| Multi-instance randomness extraction and security against bounded-storage mass surveillance | 2024-08-02 | Paper |
| Commitments to quantum states | 2024-05-08 | Paper |
| Computational wiretap coding from indistinguishability obfuscation | 2024-02-06 | Paper |
| Tracing quantum state distinguishers via backtracking | 2024-02-06 | Paper |
| Security-preserving distributed samplers: how to generate any CRS in one round without random oracles | 2024-02-02 | Paper |
| Another round of breaking and making quantum money: how to not build it from lattices, and more | 2024-01-16 | Paper |
| A lower bound on the length of signatures based on group actions and generic isogenies | 2023-12-08 | Paper |
| Full quantum equivalence of group action DLog and CDH, and more | 2023-08-25 | Paper |
| Adaptive multiparty NIKE | 2023-08-14 | Paper |
| Collusion resistant copy-protection for watermarkable functionalities | 2023-08-14 | Paper |
| To label, or not to label (in generic groups) | 2023-06-30 | Paper |
| Augmented random oracles | 2023-06-30 | Paper |
| New constructions of collapsing hashes | 2023-06-30 | Paper |
| On the feasibility of unclonable encryption, and more | 2023-06-28 | Paper |
| Franchised quantum money | 2023-05-12 | Paper |
| Redeeming reset indifferentiability and applications to post-quantum security | 2023-05-12 | Paper |
| Disappearing cryptography in the bounded storage model | 2023-04-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5875789 | 2023-02-03 | Paper |
| How to Construct Quantum Random Functions | 2022-12-08 | Paper |
| Indifferentiability for public key cryptosystems | 2022-11-09 | Paper |
| New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings | 2022-11-09 | Paper |
| Quantum algorithms for variants of average-case lattice problems via filtering | 2022-08-30 | Paper |
| Incompressible cryptography | 2022-08-30 | Paper |
| White box traitor tracing | 2022-05-18 | Paper |
| New approaches for quantum copy-protection | 2022-03-31 | Paper |
| Hidden cosets and applications to unclonable cryptography | 2022-03-31 | Paper |
| Schrödinger's pirate: how to trace a quantum decoder | 2022-03-23 | Paper |
| Classical vs quantum random oracles | 2021-12-08 | Paper |
| Towards non-interactive witness hiding | 2021-12-01 | Paper |
| Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness | 2021-08-10 | Paper |
| Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions | 2021-04-07 | Paper |
| One-shot signatures and applications to hybrid quantum/classical authentication | 2021-01-19 | Paper |
| Multiparty non-interactive key exchange and more from isogenies on elliptic curves | 2020-06-24 | Paper |
| The distinction between fixed and random generators in group-based assumptions | 2020-03-09 | Paper |
| How to record quantum queries, and applications to quantum indifferentiability | 2020-03-09 | Paper |
| Revisiting post-quantum Fiat-Shamir | 2020-03-09 | Paper |
| New techniques for obfuscating conjunctions | 2020-02-04 | Paper |
| On finding quantum multi-collisions | 2020-02-04 | Paper |
| Quantum lightning never strikes the same state twice | 2020-02-04 | Paper |
| On ELFs, deterministic encryption, and correlated-input security | 2020-02-04 | Paper |
| The magic of ELFs | 2019-08-13 | Paper |
| Parameter-hiding order revealing encryption | 2018-12-20 | Paper |
| Impossibility of order-revealing encryption in idealized models | 2018-12-06 | Paper |
| The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks | 2018-12-06 | Paper |
| Return of GGH15: provable security against zeroizing attacks | 2018-12-06 | Paper |
| Cutting-edge cryptography through the lens of secret sharing | 2018-12-03 | Paper |
| Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness | 2018-01-19 | Paper |
| Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation | 2018-01-05 | Paper |
| New security notions and feasibility results for authentication of quantum data | 2017-11-15 | Paper |
| Breaking the sub-exponential barrier in obfustopia | 2017-06-23 | Paper |
| How to Generate and Use Universal Samplers | 2017-01-06 | Paper |
| Secure Obfuscation in a Weak Multilinear Map Model | 2016-12-22 | Paper |
| Strong hardness of privacy from weak traitor tracing | 2016-12-21 | Paper |
| The Magic of ELFs | 2016-11-30 | Paper |
| Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 | 2016-10-27 | Paper |
| Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits | 2016-07-15 | Paper |
| Anonymous traitor tracing: how to embed arbitrary information in a key | 2016-07-15 | Paper |
| Functional encryption without obfuscation | 2016-04-08 | Paper |
| How to avoid obfuscation using witness PRFs | 2016-04-08 | Paper |
| Cutting-edge cryptography through the lens of secret sharing | 2016-04-08 | Paper |
| Order-revealing encryption and the hardness of private learning | 2016-03-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2950582 | 2015-10-09 | Paper |
| Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation | 2015-09-30 | Paper |
| Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation | 2014-08-07 | Paper |
| Low overhead broadcast encryption from multilinear maps | 2014-08-07 | Paper |
| Secure signatures and chosen ciphertext security in a quantum computing world | 2013-09-17 | Paper |
| Quantum-secure message authentication codes | 2013-05-31 | Paper |
| Secure identity-based encryption in the quantum random oracle model | 2012-09-25 | Paper |
| Random oracles in a quantum world | 2011-12-02 | Paper |