| Publication | Date of Publication | Type |
|---|
| A survey on delegated computation | 2022-08-11 | Paper |
| Towards a Theory of Intrusion Detection | 2022-03-09 | Paper |
| Delegating a product of group exponentiations with application to signature schemes | 2021-05-12 | Paper |
| Secure and efficient delegation of elliptic-curve pairing | 2021-02-23 | Paper |
| Cryptographic password obfuscation | 2021-01-18 | Paper |
| Efficient and secure delegation of exponentiation in general groups to a single malicious server | 2020-10-30 | Paper |
| Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups | 2018-08-17 | Paper |
| Randomness-efficient non-interactive zero knowledge | 2018-07-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5271426 | 2017-07-11 | Paper |
| Security-preserving hardness-amplification for any regular one-way function | 2016-09-29 | Paper |
| The graph clustering problem has a perfect zero-knowledge interactive proof | 2016-06-16 | Paper |
| Universal service-providers for database private information retrieval (extended abstract) | 2016-03-02 | Paper |
| On zero-knowledge proofs (extended abstract) | 2014-09-26 | Paper |
| Secure node discovery in ad-hoc networks and applications | 2013-12-06 | Paper |
| Zero-Knowledge Proofs via Polynomial Representations | 2012-09-25 | Paper |
| Combinatorial Group Testing for Corruption Localizing Hashing | 2011-08-17 | Paper |
| On server trust in private proxy auctions | 2010-11-30 | Paper |
| Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy | 2009-10-22 | Paper |
| On Monotone Formula Composition of Perfect Zero-Knowledge Languages | 2009-08-20 | Paper |
| Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model | 2009-08-18 | Paper |
| Algorithms and Computation | 2009-08-07 | Paper |
| Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model | 2009-07-23 | Paper |
| Hypergraph decomposition and secret sharing | 2009-06-30 | Paper |
| 3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge | 2009-01-29 | Paper |
| On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries | 2009-01-22 | Paper |
| Succinct NP Proofs from an Extractability Assumption | 2008-06-19 | Paper |
| Public Key Encryption with Searchable Keywords Based on Jacobi Symbols | 2008-04-11 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5489060 | 2006-09-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3374904 | 2006-03-01 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Financial Cryptography and Data Security | 2005-12-22 | Paper |
| Contemporary cryptology. | 2005-08-30 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Mathematical Foundations of Computer Science 2004 | 2005-08-22 | Paper |
| Improved Setup Assumptions for 3-Round Resettable Zero Knowledge | 2005-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4739522 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4252397 | 2004-03-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4448385 | 2004-02-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4440437 | 2003-12-17 | Paper |
| Sharing one secret vs. sharing many secrets. | 2003-08-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414269 | 2003-07-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414273 | 2003-07-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783745 | 2002-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536288 | 2002-11-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4779152 | 2002-11-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4542531 | 2002-08-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2766853 | 2002-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778839 | 2002-03-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2754163 | 2001-12-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2757259 | 2001-11-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2757268 | 2001-11-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721175 | 2001-07-01 | Paper |
| Universal service-providers for private information retrieval | 2001-05-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4952627 | 2000-10-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941875 | 2000-08-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4940693 | 2000-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4938630 | 2000-02-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4258569 | 1999-09-13 | Paper |
| Conditional Oblivious Transfer and Timed-Release Encryption | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249346 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4251066 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4381399 | 1999-01-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373608 | 1998-06-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364541 | 1998-02-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4365736 | 1998-01-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341776 | 1997-10-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341734 | 1997-07-20 | Paper |
| Zero-knowledge arguments and public-key cryptography | 1995-11-05 | Paper |
| The knowledge complexity of quadratic residuosity languages | 1994-09-25 | Paper |
| Round-optimal perfect zero-knowledge proofs | 1994-05-05 | Paper |