| Publication | Date of Publication | Type |
|---|
| A survey on delegated computation | 2022-08-11 | Paper |
Towards a theory of intrusion detection Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
Delegating a product of group exponentiations with application to signature schemes Journal of Mathematical Cryptology | 2021-05-12 | Paper |
| Secure and efficient delegation of elliptic-curve pairing | 2021-02-23 | Paper |
| Cryptographic password obfuscation | 2021-01-18 | Paper |
Efficient and secure delegation of exponentiation in general groups to a single malicious server Mathematics in Computer Science | 2020-10-30 | Paper |
| Efficient and secure delegation to a single malicious server: exponentiation over non-abelian groups | 2018-08-17 | Paper |
Randomness-efficient non-interactive zero knowledge Automata, Languages and Programming | 2018-07-04 | Paper |
| Visual cryptography from halftone error diffusion | 2017-07-11 | Paper |
Security-preserving hardness-amplification for any regular one-way function Proceedings of the thirty-first annual ACM symposium on Theory of Computing | 2016-09-29 | Paper |
The graph clustering problem has a perfect zero-knowledge interactive proof Information Processing Letters | 2016-06-16 | Paper |
Universal service-providers for database private information retrieval (extended abstract) Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing - PODC '98 | 2016-03-02 | Paper |
On zero-knowledge proofs (extended abstract) Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
Secure node discovery in ad-hoc networks and applications Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
Zero-knowledge proofs via polynomial representations Mathematical Foundations of Computer Science 2012 | 2012-09-25 | Paper |
Combinatorial Group Testing for Corruption Localizing Hashing Lecture Notes in Computer Science | 2011-08-17 | Paper |
On server trust in private proxy auctions Electronic Commerce Research | 2010-11-30 | Paper |
Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy Lecture Notes in Computer Science | 2009-10-22 | Paper |
On Monotone Formula Composition of Perfect Zero-Knowledge Languages SIAM Journal on Computing | 2009-08-20 | Paper |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model Computer Science - Theory and Applications | 2009-08-18 | Paper |
Algorithms and Computation Lecture Notes in Computer Science | 2009-08-07 | Paper |
Minimal Assumptions and Round Complexity for Concurrent Zero-Knowledge in the Bare Public-Key Model Lecture Notes in Computer Science | 2009-07-23 | Paper |
Hypergraph decomposition and secret sharing Discrete Applied Mathematics | 2009-06-30 | Paper |
3-Message NP Arguments in the BPK Model with Optimal Soundness and Zero-Knowledge Algorithms and Computation | 2009-01-29 | Paper |
On the Security of Beth’s Identification Schemes against Active and Concurrent Adversaries Mathematical Methods in Computer Science | 2009-01-22 | Paper |
Succinct NP Proofs from an Extractability Assumption Logic and Theory of Algorithms | 2008-06-19 | Paper |
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols Lecture Notes in Computer Science | 2008-04-11 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
| scientific article; zbMATH DE number 5056805 (Why is no real title available?) | 2006-09-25 | Paper |
| scientific article; zbMATH DE number 5009196 (Why is no real title available?) | 2006-03-01 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Contemporary cryptology. Advanced Courses in Mathematics -- CRM Barcelona | 2005-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Mathematical Foundations of Computer Science 2004 Lecture Notes in Computer Science | 2005-08-22 | Paper |
| Improved Setup Assumptions for 3-Round Resettable Zero Knowledge | 2005-08-12 | Paper |
| scientific article; zbMATH DE number 2088328 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 1305506 (Why is no real title available?) | 2004-03-09 | Paper |
| scientific article; zbMATH DE number 2044522 (Why is no real title available?) | 2004-02-18 | Paper |
| scientific article; zbMATH DE number 2019634 (Why is no real title available?) | 2003-12-17 | Paper |
Sharing one secret vs. sharing many secrets. Theoretical Computer Science | 2003-08-17 | Paper |
| scientific article; zbMATH DE number 1952890 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1952893 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1842511 (Why is no real title available?) | 2002-12-08 | Paper |
| scientific article; zbMATH DE number 1759348 (Why is no real title available?) | 2002-11-28 | Paper |
| scientific article; zbMATH DE number 1834656 (Why is no real title available?) | 2002-11-25 | Paper |
| scientific article; zbMATH DE number 1775398 (Why is no real title available?) | 2002-08-01 | Paper |
| scientific article; zbMATH DE number 1696658 (Why is no real title available?) | 2002-07-01 | Paper |
| scientific article; zbMATH DE number 1722670 (Why is no real title available?) | 2002-03-21 | Paper |
| scientific article; zbMATH DE number 1670843 (Why is no real title available?) | 2001-12-06 | Paper |
| scientific article; zbMATH DE number 1676657 (Why is no real title available?) | 2001-11-25 | Paper |
| scientific article; zbMATH DE number 1676661 (Why is no real title available?) | 2001-11-25 | Paper |
| scientific article; zbMATH DE number 1612532 (Why is no real title available?) | 2001-07-01 | Paper |
Universal service-providers for private information retrieval Journal of Cryptology | 2001-05-13 | Paper |
| scientific article; zbMATH DE number 1445314 (Why is no real title available?) | 2000-10-23 | Paper |
| scientific article; zbMATH DE number 1418313 (Why is no real title available?) | 2000-08-27 | Paper |
| scientific article; zbMATH DE number 1406777 (Why is no real title available?) | 2000-03-01 | Paper |
| scientific article; zbMATH DE number 1405650 (Why is no real title available?) | 2000-02-23 | Paper |
| scientific article; zbMATH DE number 1335878 (Why is no real title available?) | 1999-09-13 | Paper |
Conditional Oblivious Transfer and Timed-Release Encryption Advances in Cryptology — EUROCRYPT ’99 | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1302861 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1304335 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1136088 (Why is no real title available?) | 1999-01-10 | Paper |
| scientific article; zbMATH DE number 1107670 (Why is no real title available?) | 1998-06-11 | Paper |
| scientific article; zbMATH DE number 1088225 (Why is no real title available?) | 1998-02-10 | Paper |
| scientific article; zbMATH DE number 1088911 (Why is no real title available?) | 1998-01-29 | Paper |
| scientific article; zbMATH DE number 1024082 (Why is no real title available?) | 1997-10-06 | Paper |
| scientific article; zbMATH DE number 1024046 (Why is no real title available?) | 1997-07-20 | Paper |
Zero-knowledge arguments and public-key cryptography Information and Computation | 1995-11-05 | Paper |
The knowledge complexity of quadratic residuosity languages Theoretical Computer Science | 1994-09-25 | Paper |
Round-optimal perfect zero-knowledge proofs Information Processing Letters | 1994-05-05 | Paper |