| Publication | Date of Publication | Type |
|---|
| Quantifying the security cost of migrating protocols to practice | 2022-11-09 | Paper |
| Security in the presence of key reuse: context-separable interfaces and their applications | 2020-05-20 | Paper |
| Hedging public-key encryption in the real world | 2017-10-27 | Paper |
Salvaging weak security bounds for blockcipher-based constructions Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
A modular treatment of cryptographic APIs: the symmetric-key case Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
A provable-security analysis of Intel's secure key RNG Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Reconsidering generic composition Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
A modular framework for building variable-input-length tweakable ciphers Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Tweakable Blockciphers with Beyond Birthday-Bound Security Lecture Notes in Computer Science | 2012-09-25 | Paper |
Tag size does matter: attacks and proofs for the TLS record protocol Lecture Notes in Computer Science | 2011-12-02 | Paper |
Careful with composition: limitations of the indifferentiability framework Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Random oracles with(out) programmability Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
An analysis of the blockcipher-based hash functions from PGV Journal of Cryptology | 2010-11-12 | Paper |
Attacking the Knudsen-Preneel Compression Functions Fast Software Encryption | 2010-07-13 | Paper |
On the impossibility of highly-efficient blockcipher-based hash functions Journal of Cryptology | 2009-06-30 | Paper |
Salvaging Merkle-Damgård for Practical Applications Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Building a Collision-Resistant Compression Function from Non-compressing Primitives Automata, Languages and Programming | 2008-08-19 | Paper |
Seven-Property-Preserving Iterated Hashing: ROX Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
How to Build a Hash Function from Any Collision-Resistant Function Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions Lecture Notes in Computer Science | 2008-05-06 | Paper |
A Provable-Security Treatment of the Key-Wrap Problem Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Threshold password-authenticated key exchange Journal of Cryptology | 2006-08-14 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
| scientific article; zbMATH DE number 1951605 (Why is no real title available?) | 2003-07-21 | Paper |
| scientific article; zbMATH DE number 1942429 (Why is no real title available?) | 2003-06-30 | Paper |
| scientific article; zbMATH DE number 1942433 (Why is no real title available?) | 2003-06-30 | Paper |