| Publication | Date of Publication | Type |
|---|
Foundations of adaptor signatures | 2024-11-12 | Paper |
SoK: Descriptive Statistics Under Local Differential Privacy -- Raw Results | 2024-09-25 | Dataset |
Practical Schnorr threshold signatures without the algebraic group model Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
On the security of frequency-hiding order-preserving encryption Cryptology and Network Security | 2023-08-02 | Paper |
Subset predicate encryption and its applications Cryptology and Network Security | 2023-08-02 | Paper |
Inner product functional commitments with constant-size public parameters and openings Lecture Notes in Computer Science | 2023-07-25 | Paper |
Arithmetic garbling from bilinear maps | 2022-08-25 | Paper |
Verifiably encrypted signatures: security revisited and a new construction Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
Everlasting UC commitments from fully malicious PUFs Journal of Cryptology | 2022-07-15 | Paper |
Maliciously secure multi-client ORAM | 2022-07-01 | Paper |
Feasibility and infeasibility of secure computation with malicious PUFs Journal of Cryptology | 2020-04-28 | Paper |
Efficient invisible and unlinkable sanitizable signatures | 2020-01-28 | Paper |
On tight security proofs for Schnorr signatures Journal of Cryptology | 2019-06-20 | Paper |
(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens Journal of Cryptology | 2019-06-20 | Paper |
Homomorphic secret sharing for low degree polynomials | 2019-01-23 | Paper |
Efficient ring signatures in the standard model | 2018-03-08 | Paper |
Security of blind signatures revisited Journal of Cryptology | 2017-05-22 | Paper |
Two-message, oblivious evaluation of cryptographic functionalities Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Delegatable functional signatures Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Nearly optimal verifiable data streaming Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Foundations of reconfigurable PUFs Applied Cryptography and Network Security | 2016-03-10 | Paper |
Efficient pseudorandom functions via on-the-fly adaptation Lecture Notes in Computer Science | 2015-12-10 | Paper |
On tight security proofs for Schnorr signatures Lecture Notes in Computer Science | 2015-01-16 | Paper |
Feasibility and infeasibility of secure computation with malicious PUFs Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Webtrust -- a comprehensive authenticity and integrity framework for HTTP Applied Cryptography and Network Security | 2014-07-07 | Paper |
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens Theory of Cryptography | 2014-02-18 | Paper |
History-free sequential aggregate signatures Lecture Notes in Computer Science | 2012-09-25 | Paper |
Security of blind signatures revisited Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations Theory of Cryptography | 2012-06-15 | Paper |
How to aggregate the CL signature scheme Computer Security – ESORICS 2011 | 2011-11-22 | Paper |
Security of blind signatures under aborts and applications to adaptive oblivious transfer Journal of Mathematical Cryptology | 2011-11-15 | Paper |
Round optimal blind signatures Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Impossibility of blind signatures from one-way permutations Theory of Cryptography | 2011-05-19 | Paper |
Expedient Non-malleability Notions for Hash Functions Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
History-Free Aggregate Message Authentication Codes Lecture Notes in Computer Science | 2010-09-10 | Paper |
Generic constructions for verifiably encrypted signatures without random oracles or NIZKs Applied Cryptography and Network Security | 2010-07-06 | Paper |
Redactable signatures for tree-structured data: definitions and constructions Applied Cryptography and Network Security | 2010-07-06 | Paper |
On the impossibility of three-move blind signature schemes Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Confidential Signatures and Deterministic Signcryption Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Unlinkability of sanitizable signatures Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Public-key encryption with non-interactive opening: new constructions and stronger definitions Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Fair partially blind signatures Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Security of Blind Signatures under Aborts Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Security of Sanitizable Signatures Revisited Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |