| Publication | Date of Publication | Type |
|---|
| Foundations of adaptor signatures | 2024-11-12 | Paper |
| SoK: Descriptive Statistics Under Local Differential Privacy -- Raw Results | 2024-09-25 | Dataset |
| Practical Schnorr threshold signatures without the algebraic group model | 2024-02-02 | Paper |
| On the security of frequency-hiding order-preserving encryption | 2023-08-02 | Paper |
| Subset predicate encryption and its applications | 2023-08-02 | Paper |
| Inner product functional commitments with constant-size public parameters and openings | 2023-07-25 | Paper |
| Arithmetic garbling from bilinear maps | 2022-08-25 | Paper |
| Verifiably Encrypted Signatures: Security Revisited and a New Construction | 2022-08-19 | Paper |
| Everlasting UC commitments from fully malicious PUFs | 2022-07-15 | Paper |
| Maliciously Secure Multi-Client ORAM | 2022-07-01 | Paper |
| Feasibility and infeasibility of secure computation with malicious PUFs | 2020-04-28 | Paper |
| Efficient invisible and unlinkable sanitizable signatures | 2020-01-28 | Paper |
| On tight security proofs for Schnorr signatures | 2019-06-20 | Paper |
| (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens | 2019-06-20 | Paper |
| Homomorphic secret sharing for low degree polynomials | 2019-01-23 | Paper |
| Efficient ring signatures in the standard model | 2018-03-08 | Paper |
| Security of blind signatures revisited | 2017-05-22 | Paper |
| Two-Message, Oblivious Evaluation of Cryptographic Functionalities | 2016-11-09 | Paper |
| Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys | 2016-04-13 | Paper |
| Delegatable Functional Signatures | 2016-04-13 | Paper |
| Nearly Optimal Verifiable Data Streaming | 2016-04-13 | Paper |
| Foundations of Reconfigurable PUFs | 2016-03-10 | Paper |
| Efficient Pseudorandom Functions via On-the-Fly Adaptation | 2015-12-10 | Paper |
| On Tight Security Proofs for Schnorr Signatures | 2015-01-16 | Paper |
| Feasibility and Infeasibility of Secure Computation with Malicious PUFs | 2014-08-07 | Paper |
| WebTrust – A Comprehensive Authenticity and Integrity Framework for HTTP | 2014-07-07 | Paper |
| (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens | 2014-02-18 | Paper |
| History-free sequential aggregate signatures | 2012-09-25 | Paper |
| Security of blind signatures revisited | 2012-07-20 | Paper |
| Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations | 2012-06-15 | Paper |
| How to aggregate the CL signature scheme | 2011-11-22 | Paper |
| Security of blind signatures under aborts and applications to adaptive oblivious transfer | 2011-11-15 | Paper |
| Round optimal blind signatures | 2011-08-12 | Paper |
| Impossibility of blind signatures from one-way permutations | 2011-05-19 | Paper |
| Expedient Non-malleability Notions for Hash Functions | 2011-02-11 | Paper |
| History-Free Aggregate Message Authentication Codes | 2010-09-10 | Paper |
| Generic constructions for verifiably encrypted signatures without random oracles or NIZKs | 2010-07-06 | Paper |
| Redactable signatures for tree-structured data: definitions and constructions | 2010-07-06 | Paper |
| On the impossibility of three-move blind signature schemes | 2010-06-01 | Paper |
| Confidential Signatures and Deterministic Signcryption | 2010-05-28 | Paper |
| Unlinkability of sanitizable signatures | 2010-05-28 | Paper |
| Public-key encryption with non-interactive opening: new constructions and stronger definitions | 2010-05-04 | Paper |
| Fair partially blind signatures | 2010-05-04 | Paper |
| Security of Verifiably Encrypted Signatures and a Construction without Random Oracles | 2009-08-18 | Paper |
| Security of Blind Signatures under Aborts | 2009-03-24 | Paper |
| Security of Sanitizable Signatures Revisited | 2009-03-24 | Paper |