Publication | Date of Publication | Type |
---|
Endemic oblivious transfer via random oracles, revisited | 2024-01-16 | Paper |
A universally composable non-interactive aggregate cash system | 2023-08-25 | Paper |
GUC-secure commitments via random oracles: new impossibility and feasibility | 2023-08-21 | Paper |
An analysis of the algebraic group model | 2023-08-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q5874389 | 2023-02-07 | Paper |
Statement voting | 2021-03-17 | Paper |
Locally decodable and updatable non-malleable codes and their applications | 2020-03-03 | Paper |
Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog | 2020-01-28 | Paper |
Leakage resilience from program obfuscation | 2019-08-13 | Paper |
(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens | 2019-06-20 | Paper |
Leakage-resilient cryptography from puncturable primitives and obfuscation | 2019-01-23 | Paper |
Correcting subverted random oracles | 2018-09-26 | Paper |
Cliptography: Clipping the Power of Kleptographic Attacks | 2017-01-06 | Paper |
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond | 2016-12-22 | Paper |
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation | 2016-10-21 | Paper |
Fair and Robust Multi-party Computation Using a Global Transaction Ledger | 2016-07-15 | Paper |
Cryptography for Parallel RAM from Indistinguishability Obfuscation | 2016-04-15 | Paper |
Leakage-Resilient Public-Key Encryption from Obfuscation | 2016-04-13 | Paper |
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting | 2015-12-10 | Paper |
Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware | 2015-09-30 | Paper |
Adaptively secure broadcast, revisited | 2015-09-11 | Paper |
Distributing the setup in universally composable multi-party computation | 2015-09-03 | Paper |
Locally Decodable and Updatable Non-malleable Codes and Their Applications | 2015-07-06 | Paper |
Multi-Client Verifiable Computation with Stronger Security Guarantees | 2015-07-06 | Paper |
Multi-input Functional Encryption | 2014-05-27 | Paper |
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens | 2014-02-18 | Paper |
Functional Encryption from (Small) Hardware Tokens | 2013-12-10 | Paper |
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption | 2013-04-19 | Paper |
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS | 2013-04-19 | Paper |
Feasibility and Completeness of Cryptographic Tasks in the Quantum World | 2013-03-18 | Paper |
On the Security of the “Free-XOR” Technique | 2012-06-15 | Paper |
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer | 2009-10-20 | Paper |
Secure Function Collection with Sublinear Storage | 2009-07-14 | Paper |
Zero-Knowledge Proofs with Witness Elimination | 2009-03-24 | Paper |
Concurrent Blind Signatures Without Random Oracles | 2008-11-27 | Paper |
Equivocal Blind Signatures and Adaptive UC-Security | 2008-03-05 | Paper |
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge | 2007-11-28 | Paper |