| Publication | Date of Publication | Type |
|---|
| Taming iterative grinding attacks on blockchain beacons | 2026-03-31 | Paper |
Practical settlement bounds for longest-chain consensus Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
SNACKs: leveraging proofs of sequential work for blockchain light clients Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
A composable security treatment of ECVRF and batch verifications Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
| Fast isomorphic state channels | 2022-06-22 | Paper |
| SoK: algorithmic incentive manipulation attacks on permissionless PoW cryptocurrencies | 2022-06-01 | Paper |
| Pay to win: cheap, cross-chain bribing attacks on PoW cryptocurrencies | 2022-06-01 | Paper |
| Dynamic ad hoc clock synchronization | 2021-12-08 | Paper |
| Ledger combiners for fast settlement | 2021-12-01 | Paper |
| Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain | 2018-07-09 | Paper |
Provably robust sponge-based PRNGs and KDFs Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Generic security of NMAC and HMAC with input whitening Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
The exact PRF security of truncation: tight bounds for keyed sponges and truncated CBC Lecture Notes in Computer Science | 2015-12-10 | Paper |
Query-complexity amplification for random oracles Lecture Notes in Computer Science | 2015-09-24 | Paper |
Relaxing full-codebook security: a refined analysis of key-length extension schemes Fast Software Encryption | 2015-09-18 | Paper |
The exact PRF-security of NMAC and HMAC Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Plain versus randomized cascading-based key-length extension for block ciphers Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Resource-restricted indifferentiability Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Efficient and optimally secure key-length extension for block ciphers via randomized cascading Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Free-start distinguishing: combining two types of indistinguishability amplification Lecture Notes in Computer Science | 2010-09-29 | Paper |
Cascade Encryption Revisited Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
| On ciphertext undetectability | 2009-03-11 | Paper |
Assisted Problem Solving and Decompositions of Finite Automata SOFSEM 2008: Theory and Practice of Computer Science | 2008-03-07 | Paper |