| Publication | Date of Publication | Type |
|---|
| Formalizing hash-then-sign signatures | 2024-11-12 | Paper |
On secure ratcheting with immediate decryption Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Sequential digital signatures for cryptographic software-update authentication Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
Encrypt-to-Self: Securely Outsourcing Storage 1511.68047 | 2022-12-22 | Paper |
Cryptanalysis of OCB2: attacks on authenticity and confidentiality Journal of Cryptology | 2020-11-06 | Paper |
Cryptanalysis of OCB2: attacks on authenticity and confidentiality Advances in Cryptology – CRYPTO 2019 | 2020-05-20 | Paper |
| Subverting decryption in AEAD | 2020-05-06 | Paper |
| Lossy trapdoor permutations with improved lossiness | 2020-01-28 | Paper |
| Towards bidirectional ratcheted key exchange | 2018-09-12 | Paper |
| Shorter double-authentication preventing signatures for small address spaces | 2018-07-17 | Paper |
| Hashing solutions instead of generating problems: on the interactive certification of RSA moduli | 2018-05-29 | Paper |
| Hybrid encryption in a multi-user setting, revisited | 2018-05-16 | Paper |
| KEM combiners | 2018-05-16 | Paper |
| On the one-per-message unforgeability of (EC)DSA and its variants | 2018-01-19 | Paper |
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures Lecture Notes in Computer Science | 2017-06-13 | Paper |
Selective opening security from simulatable data encapsulation Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
From Identification to Signatures, Tightly: A Framework and Generic Transforms Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Cryptographic enforcement of information flow policies without public information Applied Cryptography and Network Security | 2016-03-10 | Paper |
Cold boot attacks in the discrete logarithm setting Lecture Notes in Computer Science | 2016-03-02 | Paper |
Linkable message tagging: solving the key distribution problem of signature schemes Information Security and Privacy | 2015-10-20 | Paper |
Plaintext Recovery Attacks Against WPA/TKIP Fast Software Encryption | 2015-09-18 | Paper |
A more cautious approach to security against mass surveillance Fast Software Encryption | 2015-09-18 | Paper |
Even more practical secure logging: tree-based seekable sequential key generators Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
Double-authentication-preventing signatures Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) Lecture Notes in Computer Science | 2015-01-16 | Paper |
ASICS: Authenticated key exchange security incorporating certification systems Lecture Notes in Computer Science | 2014-10-16 | Paper |
Practical secure logging: seekable sequential key generators Lecture Notes in Computer Science | 2014-10-16 | Paper |
Simple, efficient and strongly KI-secure hierarchical key assignment schemes Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Publicly verifiable ciphertexts Lecture Notes in Computer Science | 2012-09-25 | Paper |
Affiliation-hiding authentication with minimal bandwidth consumption Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication | 2011-10-14 | Paper |
Private discovery of common social contacts Applied Cryptography and Network Security | 2011-06-28 | Paper |
Taming Big Brother Ambitions: More Privacy for Secret Handshakes Privacy Enhancing Technologies | 2010-08-10 | Paper |
Redactable signatures for tree-structured data: definitions and constructions Applied Cryptography and Network Security | 2010-07-06 | Paper |
Privacy-preserving group discovery with linear complexity Applied Cryptography and Network Security | 2010-07-06 | Paper |
Affiliation-hiding key exchange with untrusted group authorities Applied Cryptography and Network Security | 2010-07-06 | Paper |