| Publication | Date of Publication | Type |
|---|
Adaptive multiparty NIKE Theory of Cryptography | 2023-08-14 | Paper |
scientific article; zbMATH DE number 7651035 (Why is no real title available?) (available as arXiv preprint) | 2023-02-07 | Paper |
| NIZK from LPN and trapdoor hash via correlation intractability for approximable relations | 2022-12-07 | Paper |
| Chosen ciphertext security from injective trapdoor functions | 2022-11-09 | Paper |
| Signature schemes with randomized verification | 2022-07-01 | Paper |
| On perfect correctness in (lockable) obfuscation | 2021-12-01 | Paper |
| Adaptively secure constrained pseudorandom functions | 2021-03-17 | Paper |
Collusion resistant traitor tracing from learning with errors SIAM Journal on Computing | 2020-10-29 | Paper |
| Output compression, MPC, and iO for Turing machines | 2020-05-20 | Paper |
| New approaches to traitor tracing with embedded identities | 2020-04-30 | Paper |
| Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption | 2020-03-09 | Paper |
Collusion resistant traitor tracing from learning with errors Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing | 2019-08-22 | Paper |
| Impossibility of simulation secure functional encryption even with random oracles | 2018-12-11 | Paper |
| A generic approach to constructing and proving verifiable random functions | 2018-01-19 | Paper |
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption Lecture Notes in Computer Science | 2017-06-13 | Paper |
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles Lecture Notes in Computer Science | 2017-06-13 | Paper |
Universal samplers with fast verification Lecture Notes in Computer Science | 2017-06-13 | Paper |
Semi-adaptive security and bundling functionalities made generic and easy Theory of Cryptography | 2016-12-22 | Paper |
Circular Security Separations for Arbitrary Length Cycles from LWE Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Deterministic Public-Key Encryption Under Continual Leakage Applied Cryptography and Network Security | 2016-10-04 | Paper |
Constrained Pseudorandom Functions for Unconstrained Inputs Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Adaptively secure puncturable pseudorandom functions in the standard model Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Universal signature aggregators Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Indistinguishability obfuscation for Turing machines with unbounded memory Proceedings of the forty-seventh annual ACM symposium on Theory of Computing | 2015-08-21 | Paper |
Functional encryption for randomized functionalities Theory of Cryptography | 2015-07-06 | Paper |
Separations in circular security for arbitrary length key cycles Theory of Cryptography | 2015-07-06 | Paper |
On the Kernelization Complexity of Colorful Motifs Parameterized and Exact Computation | 2010-12-07 | Paper |