| Publication | Date of Publication | Type |
|---|
| From random probing to noisy leakages without field-size dependence | 2024-11-13 | Paper |
| Efficiently testable circuits | 2024-09-25 | Paper |
| Efficiently testable circuits without conductivity | 2024-08-02 | Paper |
Individual cryptography Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
| Trojan-resilience without cryptography | 2023-04-13 | Paper |
| Reverse firewalls for actively secure MPCs | 2022-11-09 | Paper |
| Simple refreshing in the noisy leakage model | 2020-05-11 | Paper |
| Multi-party virtual state channels | 2020-02-04 | Paper |
Unifying leakage models: from probing attacks to noisy leakage Journal of Cryptology | 2019-01-29 | Paper |
Non-malleable codes Journal of the ACM | 2018-12-06 | Paper |
Quasi chain rule for min-entropy Information Processing Letters | 2018-04-04 | Paper |
| Position-based cryptography and multiparty communication complexity | 2018-01-19 | Paper |
Bounded-retrieval model with keys derived from private data Information Security and Cryptology | 2017-05-05 | Paper |
Towards sound fresh re-keying with hard (physical) learning problems Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Circuit compilers with \(O(1/\log (n))\) leakage rate Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Optimal amplification of noisy leakages Theory of Cryptography | 2016-04-08 | Paper |
Efficient leakage resilient circuit compilers Lecture Notes in Computer Science | 2016-03-02 | Paper |
Proofs of space Lecture Notes in Computer Science | 2015-12-10 | Paper |
PoW-based distributed cryptography with no trusted setup Lecture Notes in Computer Science | 2015-12-10 | Paper |
One-time programs with limited memory Information Security and Cryptology | 2015-12-02 | Paper |
Noisy leakage revisited Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Leakage resilience of the Blom's key distribution scheme Lecture Notes in Computer Science | 2015-09-30 | Paper |
Modeling Bitcoin contracts by timed automata Lecture Notes in Computer Science | 2015-08-06 | Paper |
Leakage-resilient non-malleable codes Theory of Cryptography | 2015-07-06 | Paper |
On the complexity of verifiable secret sharing and multiparty computation Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
Position-based cryptography from noisy channels Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Unifying leakage models: from probing attacks to noisy leakage. Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Non-malleable codes from two-source extractors Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Leakage-resilient circuits without computational assumptions Theory of Cryptography | 2012-06-15 | Paper |
Leakage-resilient cryptography from the inner-product extractor Lecture Notes in Computer Science | 2011-12-02 | Paper |
Key-evolution schemes resilient to space-bounded leakage Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
One-time computable self-erasing functions Theory of Cryptography | 2011-05-19 | Paper |
A lower bound on the key length of information-theoretic forward-secure storage schemes Lecture Notes in Computer Science | 2010-09-29 | Paper |
Leakage-resilient storage Lecture Notes in Computer Science | 2010-09-10 | Paper |
How to pair with a human Lecture Notes in Computer Science | 2010-09-10 | Paper |
Tight security proofs for the bounded-storage model Proceedings of the thiry-fourth annual ACM symposium on Theory of computing | 2010-08-05 | Paper |
On Active Attacks on Sensor Network Key Distribution Schemes Algorithmic Aspects of Wireless Sensor Networks | 2010-01-05 | Paper |
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
On Forward-Secure Storage Lecture Notes in Computer Science | 2007-09-04 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Adaptive versus non-adaptive security of multi-party protocols Journal of Cryptology | 2004-10-01 | Paper |
Optimal randomizer efficiency in the bounded-storage model Journal of Cryptology | 2004-09-22 | Paper |
| scientific article; zbMATH DE number 1722683 (Why is no real title available?) | 2002-03-21 | Paper |
| scientific article; zbMATH DE number 1304080 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1086662 (Why is no real title available?) | 1998-06-11 | Paper |