| Publication | Date of Publication | Type |
|---|
| Rational protocol design: cryptography against incentive-driven adversaries | 2025-05-20 | Paper |
Asymmetric distributed trust Distributed Computing | 2024-09-10 | Paper |
Asymmetric Distributed Trust (available as arXiv preprint) | 2023-02-07 | Paper |
| Universal composition with global subroutines: capturing global setup within plain UC | 2022-03-23 | Paper |
Non-malleable encryption: simpler, shorter, stronger Journal of Cryptology | 2020-11-06 | Paper |
| Nonces are noticed: AEAD revisited | 2020-05-20 | Paper |
Toward an algebraic theory of systems Theoretical Computer Science | 2018-09-24 | Paper |
| Fair distributed computation of reactive functions | 2018-08-24 | Paper |
| Updatable encryption with post-compromise security | 2018-07-17 | Paper |
| On composable security for digital signatures | 2018-05-16 | Paper |
| Moderately hard functions: definition, instantiations, and applications | 2018-01-19 | Paper |
scientific article; zbMATH DE number 6765508 (Why is no real title available?) (available as arXiv preprint) | 2017-08-25 | Paper |
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3 Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Nonce-based cryptography: retaining security when randomness fails Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Non-malleable encryption: simpler, shorter, stronger Theory of Cryptography | 2016-03-23 | Paper |
How fair is your protocol? A utility-based approach to protocol optimality Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing | 2016-03-23 | Paper |
Augmented secure channels and the goal of the TLS 1.3 record layer Provable Security | 2016-01-27 | Paper |
(De-)constructing TLS 1.3 Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Robust authenticated encryption and the limits of symmetric cryptography Cryptography and Coding | 2016-01-12 | Paper |
Query-complexity amplification for random oracles Lecture Notes in Computer Science | 2015-09-24 | Paper |
From single-bit to multi-bit public-key encryption via non-malleable codes Theory of Cryptography | 2015-07-06 | Paper |
Constructing confidential channels from authenticated channels-public-key encryption revisited Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
A constructive perspective on key encapsulation Lecture Notes in Computer Science | 2013-12-10 | Paper |
Universally composable synchronous computation Theory of Cryptography | 2013-03-18 | Paper |
Confidentiality and integrity: a constructive perspective Theory of Cryptography | 2012-06-15 | Paper |