| Publication | Date of Publication | Type |
|---|
| Is ML-based cryptanalysis inherently limited? Simulating cryptographic adversaries via gradient-based methods | 2024-12-13 | Paper |
Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Authenticated encryption with key identification Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
| A fast and simple partially oblivious PRF, with applications | 2022-08-30 | Paper |
| Asymmetric message franking: content moderation for metadata-private end-to-end encryption | 2020-03-09 | Paper |
| Fast message franking: from invisible salamanders to encryptment | 2018-09-12 | Paper |
| A new distribution-sensitive secure sketch and popularity-proportional hashing | 2017-10-27 | Paper |
| Message franking via committing authenticated encryption | 2017-10-27 | Paper |
| Key rotation for authenticated encryption | 2017-10-27 | Paper |
Modifying an enciphering scheme after deployment Lecture Notes in Computer Science | 2017-06-13 | Paper |
Honey Encryption Beyond Message Recovery Security Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
A formal treatment of backdoored pseudorandom generators Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Honey encryption: security beyond the brute-force bound Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
The mix-and-cut shuffle: small-domain encryption secure against \(N\) queries Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Message-locked encryption and secure deduplication Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Multi-instance security and its application to password-based cryptography Lecture Notes in Computer Science | 2012-09-25 | Paper |
To hash or not to hash again? (In)differentiability results for \(H^2\) and HMAC Lecture Notes in Computer Science | 2012-09-25 | Paper |
Randomness condensers for efficiently samplable, seed-dependent sources Theory of Cryptography | 2012-06-15 | Paper |
Tag size does matter: attacks and proofs for the TLS record protocol Lecture Notes in Computer Science | 2011-12-02 | Paper |
Careful with composition: limitations of the indifferentiability framework Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Random oracles with(out) programmability Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Hedged public-key encryption: how to protect against bad randomness Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Format-preserving encryption Selected Areas in Cryptography | 2009-12-09 | Paper |
Salvaging Merkle-Damgård for Practical Applications Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles Lecture Notes in Computer Science | 2009-02-10 | Paper |
How to Enrich the Message Space of a Cipher Fast Software Encryption | 2008-09-16 | Paper |
How to Build a Hash Function from Any Collision-Resistant Function Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Multi-Property-Preserving Hash Domain Extension and the EMD Transform Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms Automata, Languages and Programming | 2007-11-28 | Paper |