| Publication | Date of Publication | Type |
|---|
Cryptanalytic extraction of neural network models (available as arXiv preprint) | 2022-12-07 | Paper |
Amplification by shuffling: from local to central differential privacy via anonymity Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms | 2019-10-15 | Paper |
Incremental deterministic public-key encryption Journal of Cryptology | 2018-04-26 | Paper |
| Strengthening the security of encrypted databases: non-transitive JOINs | 2018-01-19 | Paper |
| Do distributed differentially-private protocols require oblivious transfer? | 2017-12-19 | Paper |
Message transmission with reverse firewalls -- secure communication on corrupted machines Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Cryptographic reverse firewalls Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Hosting services on an untrusted cloud Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Message-Locked Encryption for Lock-Dependent Messages Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Differential privacy with imperfect randomness Lecture Notes in Computer Science | 2012-09-25 | Paper |
Incremental Deterministic Public-Key Encryption Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Sketching in Adversarial Environments SIAM Journal on Computing | 2012-03-15 | Paper |
Publicly verifiable secret sharing for cloud-based key management Lecture Notes in Computer Science | 2011-12-16 | Paper |
Cryptographic primitives enforcing communication and storage complexity Financial Cryptography | 2011-04-20 | Paper |
Domain extension for enhanced target collision-resistant hash functions Fast Software Encryption | 2010-07-13 | Paper |
Computational Differential Privacy Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
| scientific article; zbMATH DE number 5485579 (Why is no real title available?) | 2009-01-05 | Paper |
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers Lecture Notes in Computer Science | 2008-04-17 | Paper |
Our Data, Ourselves: Privacy Via Distributed Noise Generation Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Applications of SAT Solvers to Cryptanalysis of Hash Functions Lecture Notes in Computer Science | 2007-09-04 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Algorithmic Number Theory Lecture Notes in Computer Science | 2007-05-02 | Paper |
| scientific article; zbMATH DE number 2080497 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 1962145 (Why is no real title available?) | 2003-08-10 | Paper |
| scientific article; zbMATH DE number 1942428 (Why is no real title available?) | 2003-06-30 | Paper |
| scientific article; zbMATH DE number 1617943 (Why is no real title available?) | 2001-07-12 | Paper |