| Publication | Date of Publication | Type |
|---|
| From random probing to noisy leakages without field-size dependence | 2024-11-13 | Paper |
| Efficiently testable circuits | 2024-09-25 | Paper |
| Efficiently testable circuits without conductivity | 2024-08-02 | Paper |
| Individual cryptography | 2024-02-02 | Paper |
| Trojan-resilience without cryptography | 2023-04-13 | Paper |
| Reverse firewalls for actively secure MPCs | 2022-11-09 | Paper |
| Simple refreshing in the noisy leakage model | 2020-05-11 | Paper |
| Multi-party virtual state channels | 2020-02-04 | Paper |
| Unifying leakage models: from probing attacks to noisy leakage | 2019-01-29 | Paper |
| Non-malleable codes | 2018-12-06 | Paper |
| Quasi chain rule for min-entropy | 2018-04-04 | Paper |
| Position-based cryptography and multiparty communication complexity | 2018-01-19 | Paper |
| Bounded-retrieval model with keys derived from private data | 2017-05-05 | Paper |
| Towards sound fresh re-keying with hard (physical) learning problems | 2016-10-27 | Paper |
| Circuit compilers with \(O(1/\log (n))\) leakage rate | 2016-07-15 | Paper |
| Optimal amplification of noisy leakages | 2016-04-08 | Paper |
| Efficient leakage resilient circuit compilers | 2016-03-02 | Paper |
| Proofs of space | 2015-12-10 | Paper |
| PoW-based distributed cryptography with no trusted setup | 2015-12-10 | Paper |
| One-time programs with limited memory | 2015-12-02 | Paper |
| Noisy leakage revisited | 2015-09-30 | Paper |
| Leakage resilience of the Blom's key distribution scheme | 2015-09-30 | Paper |
| Modeling Bitcoin contracts by timed automata | 2015-08-06 | Paper |
| Leakage-resilient non-malleable codes | 2015-07-06 | Paper |
| On the complexity of verifiable secret sharing and multiparty computation | 2014-09-26 | Paper |
| Position-based cryptography from noisy channels | 2014-06-24 | Paper |
| Unifying leakage models: from probing attacks to noisy leakage. | 2014-05-27 | Paper |
| Non-malleable codes from two-source extractors | 2013-09-17 | Paper |
| Leakage-resilient circuits without computational assumptions | 2012-06-15 | Paper |
| Leakage-resilient cryptography from the inner-product extractor | 2011-12-02 | Paper |
| Key-evolution schemes resilient to space-bounded leakage | 2011-08-12 | Paper |
| One-time computable self-erasing functions | 2011-05-19 | Paper |
| A lower bound on the key length of information-theoretic forward-secure storage schemes | 2010-09-29 | Paper |
| Leakage-resilient storage | 2010-09-10 | Paper |
| How to pair with a human | 2010-09-10 | Paper |
| Tight security proofs for the bounded-storage model | 2010-08-05 | Paper |
| On Active Attacks on Sensor Network Key Distribution Schemes | 2010-01-05 | Paper |
| The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement | 2009-02-24 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| On Forward-Secure Storage | 2007-09-04 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Adaptive versus non-adaptive security of multi-party protocols | 2004-10-01 | Paper |
| Optimal randomizer efficiency in the bounded-storage model | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778854 | 2002-03-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250770 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4362912 | 1998-06-11 | Paper |