| Publication | Date of Publication | Type |
|---|
| Achievable \textsf{CCA2} relaxation for homomorphic encryption | 2024-12-27 | Paper |
| Homomorphic encryption: a mathematical survey | 2024-03-20 | Paper |
| Achievable \textsf{CCA2} relaxation for homomorphic encryption | 2023-08-14 | Paper |
| Random-index PIR and applications | 2023-04-13 | Paper |
| Practical non-interactive publicly verifiable secret sharing with thousands of parties | 2022-08-30 | Paper |
| YOSO: You only speak once. Secure MPC with stateless ephemeral roles | 2022-04-22 | Paper |
| Can a public blockchain keep a secret? | 2021-12-01 | Paper |
| Homomorphic encryption for finite automata | 2020-05-05 | Paper |
| Compressible FHE with applications to PIR | 2020-04-30 | Paper |
| A unified framework for trapdoor-permutation-based sequential aggregate signatures | 2018-05-29 | Paper |
| On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input | 2018-01-05 | Paper |
| Computing on the edge of chaos: structure and randomness in encrypted computation | 2017-11-06 | Paper |
| Cryptanalyses of Candidate Branching Program Obfuscators | 2017-06-23 | Paper |
| (Leveled) fully homomorphic encryption without bootstrapping | 2016-10-24 | Paper |
| (Leveled) fully homomorphic encryption without bootstrapping | 2016-10-07 | Paper |
| Candidate indistinguishability obfuscation and functional encryption for all circuits | 2016-07-04 | Paper |
| Functional encryption without obfuscation | 2016-04-08 | Paper |
| Private database access with HE-over-ORAM architecture | 2016-03-10 | Paper |
| Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | 2015-12-10 | Paper |
| Graph-induced multilinear maps from lattices | 2015-07-06 | Paper |
| Fully homomorphic encryption using ideal lattices | 2015-02-04 | Paper |
| Optimizing ORAM and Using It Efficiently for Secure Computation | 2014-08-19 | Paper |
| Witness encryption and its applications | 2014-08-07 | Paper |
| Witness encryption from instance independent assumptions | 2014-08-07 | Paper |
| On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input | 2014-08-07 | Paper |
| Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits | 2014-07-30 | Paper |
| (Leveled) fully homomorphic encryption without bootstrapping | 2014-07-01 | Paper |
| Separating succinct non-interactive arguments from all falsifiable assumptions | 2014-06-05 | Paper |
| Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits | 2014-05-27 | Paper |
| Garbled RAM revisited | 2014-05-27 | Paper |
| Two-round secure MPC from indistinguishability obfuscation | 2014-02-18 | Paper |
| Private database queries using somewhat homomorphic encryption | 2014-01-24 | Paper |
| Discrete Gaussian leftover hash lemma over infinite domains | 2013-12-10 | Paper |
| Attribute-based encryption for circuits from multilinear maps | 2013-09-17 | Paper |
| Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based | 2013-09-02 | Paper |
| Quadratic span programs and succinct NIZKs without PCPs | 2013-05-31 | Paper |
| Candidate Multilinear Maps from Ideal Lattices | 2013-05-31 | Paper |
| Packed ciphertexts in LWE-based homomorphic encryption | 2013-04-19 | Paper |
| Encrypted messages from the heights of cryptomania | 2013-03-18 | Paper |
| Ring switching in BGV-style homomorphic encryption | 2012-09-25 | Paper |
| Homomorphic evaluation of the AES circuit | 2012-09-25 | Paper |
| Better bootstrapping in fully homomorphic encryption | 2012-07-20 | Paper |
| Fully homomorphic encryption with polylog overhead | 2012-06-29 | Paper |
| Implementing Gentry's fully-homomorphic encryption scheme | 2011-05-27 | Paper |
| \(i\)-hop homomorphic encryption and rerandomizable Yao circuits | 2010-08-24 | Paper |
| Non-interactive verifiable computing: outsourcing computation to untrusted workers | 2010-08-24 | Paper |
| Toward basing fully homomorphic encryption on worst-case hardness | 2010-08-24 | Paper |
| Computing arbitrary functions of encrypted data | 2010-07-14 | Paper |
| Fully homomorphic encryption over the integers | 2010-06-01 | Paper |
| A simple BGN-type cryptosystem from LWE | 2010-06-01 | Paper |
| The geometry of provable security: some proofs of security in which lattices make a surprise appearance | 2010-03-05 | Paper |
| Computing on Encrypted Data | 2009-11-26 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) | 2009-05-12 | Paper |
| Hierarchical Identity Based Encryption with Polynomially Many Levels | 2009-03-03 | Paper |
| New Multiparty Signature Schemes for Network Routing Applications | 2009-02-24 | Paper |
| Trapdoors for hard lattices and new cryptographic constructions | 2009-01-05 | Paper |
| Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs | 2008-03-18 | Paper |
| Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys | 2008-03-17 | Paper |
| Practical Identity-Based Encryption Without Random Oracles | 2007-09-24 | Paper |
| A Method for Making Password-Based Key Exchange Resilient to Server Compromise | 2007-09-04 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Information Security | 2006-10-16 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Financial Cryptography and Data Security | 2005-12-22 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Advances in Cryptology - ASIACRYPT 2004 | 2005-08-12 | Paper |
| Advances in Cryptology - ASIACRYPT 2004 | 2005-06-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737253 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474162 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434890 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434881 | 2003-11-26 | Paper |
| Hierarchical ID-Based Cryptography | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778849 | 2002-03-21 | Paper |