Publication | Date of Publication | Type |
---|
Individual cryptography | 2024-02-02 | Paper |
Trojan-resilience without cryptography | 2023-04-13 | Paper |
Reverse firewalls for actively secure MPCs | 2022-11-09 | Paper |
Simple refreshing in the noisy leakage model | 2020-05-11 | Paper |
Multi-party virtual state channels | 2020-02-04 | Paper |
Unifying leakage models: from probing attacks to noisy leakage | 2019-01-29 | Paper |
Non-Malleable Codes | 2018-12-06 | Paper |
Quasi chain rule for min-entropy | 2018-04-04 | Paper |
Position-based cryptography and multiparty communication complexity | 2018-01-19 | Paper |
Bounded-Retrieval Model with Keys Derived from Private Data | 2017-05-05 | Paper |
Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems | 2016-10-27 | Paper |
Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate | 2016-07-15 | Paper |
Optimal Amplification of Noisy Leakages | 2016-04-08 | Paper |
Efficient Leakage Resilient Circuit Compilers | 2016-03-02 | Paper |
PoW-Based Distributed Cryptography with No Trusted Setup | 2015-12-10 | Paper |
Proofs of Space | 2015-12-10 | Paper |
One-Time Programs with Limited Memory | 2015-12-02 | Paper |
Leakage Resilience of the Blom’s Key Distribution Scheme | 2015-09-30 | Paper |
Noisy Leakage Revisited | 2015-09-30 | Paper |
Modeling Bitcoin Contracts by Timed Automata | 2015-08-06 | Paper |
Leakage-Resilient Non-malleable Codes | 2015-07-06 | Paper |
On the complexity of verifiable secret sharing and multiparty computation | 2014-09-26 | Paper |
Position-Based Cryptography from Noisy Channels | 2014-06-24 | Paper |
Unifying Leakage Models: From Probing Attacks to Noisy Leakage. | 2014-05-27 | Paper |
Non-malleable Codes from Two-Source Extractors | 2013-09-17 | Paper |
Leakage-Resilient Circuits without Computational Assumptions | 2012-06-15 | Paper |
Leakage-Resilient Cryptography from the Inner-Product Extractor | 2011-12-02 | Paper |
Key-Evolution Schemes Resilient to Space-Bounded Leakage | 2011-08-12 | Paper |
One-Time Computable Self-erasing Functions | 2011-05-19 | Paper |
A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes | 2010-09-29 | Paper |
Leakage-Resilient Storage | 2010-09-10 | Paper |
How to Pair with a Human | 2010-09-10 | Paper |
Tight security proofs for the bounded-storage model | 2010-08-05 | Paper |
On Active Attacks on Sensor Network Key Distribution Schemes | 2010-01-05 | Paper |
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement | 2009-02-24 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
On Forward-Secure Storage | 2007-09-04 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Adaptive versus non-adaptive security of multi-party protocols | 2004-10-01 | Paper |
Optimal randomizer efficiency in the bounded-storage model | 2004-09-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778854 | 2002-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250770 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4362912 | 1998-06-11 | Paper |