| Publication | Date of Publication | Type |
|---|
| Foundations of adaptor signatures | 2024-11-12 | Paper |
| SoK: Descriptive Statistics Under Local Differential Privacy -- Raw Results | 2024-09-25 | Dataset |
| Practical Schnorr threshold signatures without the algebraic group model | 2024-02-02 | Paper |
| On the security of frequency-hiding order-preserving encryption | 2023-08-02 | Paper |
| Subset predicate encryption and its applications | 2023-08-02 | Paper |
| Inner product functional commitments with constant-size public parameters and openings | 2023-07-25 | Paper |
| Arithmetic garbling from bilinear maps | 2022-08-25 | Paper |
| Verifiably encrypted signatures: security revisited and a new construction | 2022-08-19 | Paper |
| Everlasting UC commitments from fully malicious PUFs | 2022-07-15 | Paper |
| Maliciously secure multi-client ORAM | 2022-07-01 | Paper |
| Feasibility and infeasibility of secure computation with malicious PUFs | 2020-04-28 | Paper |
| Efficient invisible and unlinkable sanitizable signatures | 2020-01-28 | Paper |
| On tight security proofs for Schnorr signatures | 2019-06-20 | Paper |
| (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens | 2019-06-20 | Paper |
| Homomorphic secret sharing for low degree polynomials | 2019-01-23 | Paper |
| Efficient ring signatures in the standard model | 2018-03-08 | Paper |
| Security of blind signatures revisited | 2017-05-22 | Paper |
| Two-message, oblivious evaluation of cryptographic functionalities | 2016-11-09 | Paper |
| Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys | 2016-04-13 | Paper |
| Delegatable functional signatures | 2016-04-13 | Paper |
| Nearly optimal verifiable data streaming | 2016-04-13 | Paper |
| Foundations of reconfigurable PUFs | 2016-03-10 | Paper |
| Efficient pseudorandom functions via on-the-fly adaptation | 2015-12-10 | Paper |
| On tight security proofs for Schnorr signatures | 2015-01-16 | Paper |
| Feasibility and infeasibility of secure computation with malicious PUFs | 2014-08-07 | Paper |
| Webtrust -- a comprehensive authenticity and integrity framework for HTTP | 2014-07-07 | Paper |
| (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens | 2014-02-18 | Paper |
| History-free sequential aggregate signatures | 2012-09-25 | Paper |
| Security of blind signatures revisited | 2012-07-20 | Paper |
| Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations | 2012-06-15 | Paper |
| How to aggregate the CL signature scheme | 2011-11-22 | Paper |
| Security of blind signatures under aborts and applications to adaptive oblivious transfer | 2011-11-15 | Paper |
| Round optimal blind signatures | 2011-08-12 | Paper |
| Impossibility of blind signatures from one-way permutations | 2011-05-19 | Paper |
| Expedient Non-malleability Notions for Hash Functions | 2011-02-11 | Paper |
| History-Free Aggregate Message Authentication Codes | 2010-09-10 | Paper |
| Generic constructions for verifiably encrypted signatures without random oracles or NIZKs | 2010-07-06 | Paper |
| Redactable signatures for tree-structured data: definitions and constructions | 2010-07-06 | Paper |
| On the impossibility of three-move blind signature schemes | 2010-06-01 | Paper |
| Confidential Signatures and Deterministic Signcryption | 2010-05-28 | Paper |
| Unlinkability of sanitizable signatures | 2010-05-28 | Paper |
| Public-key encryption with non-interactive opening: new constructions and stronger definitions | 2010-05-04 | Paper |
| Fair partially blind signatures | 2010-05-04 | Paper |
| Security of Verifiably Encrypted Signatures and a Construction without Random Oracles | 2009-08-18 | Paper |
| Security of Blind Signatures under Aborts | 2009-03-24 | Paper |
| Security of Sanitizable Signatures Revisited | 2009-03-24 | Paper |