| Publication | Date of Publication | Type |
|---|
| Succinctly-committing authenticated encryption | 2024-12-13 | Paper |
Symmetric and dual PRFs from standard assumptions: a generic validation of a prevailing assumption Journal of Cryptology | 2024-10-11 | Paper |
When messages are keys: is HMAC a dual-PRF? Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA Lecture Notes in Computer Science | 2023-11-24 | Paper |
Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks Topics in Cryptology – CT-RSA 2023 | 2023-10-04 | Paper |
Forward-security under continual leakage Cryptology and Network Security | 2023-08-02 | Paper |
Better than advertised security for non-interactive threshold signatures Advances in Cryptology – CRYPTO 2022 | 2023-07-07 | Paper |
Chain Reductions for Multi-signatures and the HBMS Scheme Lecture Notes in Computer Science | 2023-05-26 | Paper |
| Efficient schemes for committing authenticated encryption | 2022-08-30 | Paper |
| Incremental cryptography revisited: PRFs, nonces and modular design | 2022-07-06 | Paper |
| Dual-mode NIZKs: possibility and impossibility results for property transfer | 2022-07-06 | Paper |
| The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures | 2022-07-06 | Paper |
| Security under message-derived keys: signcryption in iMessage | 2021-12-01 | Paper |
| Nonces are noticed: AEAD revisited | 2020-05-20 | Paper |
| The local forking lemma and its application to deterministic encryption | 2020-05-11 | Paper |
Robust encryption Journal of Cryptology | 2018-05-28 | Paper |
| Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups | 2018-05-16 | Paper |
| Ratcheted encryption and key exchange: the security of messaging | 2017-10-27 | Paper |
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures Lecture Notes in Computer Science | 2017-06-13 | Paper |
From Identification to Signatures, Tightly: A Framework and Generic Transforms Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
NIZKs with an untrusted CRS: security in the face of parameter subversion Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Big-key symmetric encryption: resisting key exfiltration Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3 Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Hash-Function Based PRFs: AMAC and Its Multi-User Security Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Nonce-based cryptography: retaining security when randomness fails Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Improved non-approximability results Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94 | 2016-09-01 | Paper |
Corrigendum to: ``Efficient probabilistic checkable proofs and applications to approximation Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94 | 2016-09-01 | Paper |
New negative results on differing-inputs obfuscation Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Contention in cryptoland: obfuscation, leakage and UCE Theory of Cryptography | 2016-04-08 | Paper |
Point-function obfuscation: a framework and generic constructions Theory of Cryptography | 2016-04-08 | Paper |
New proofs for NMAC and HMAC: security without collision resistance Journal of Cryptology | 2016-01-11 | Paper |
Keying hash functions for message authentication Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Resisting randomness subversion: fast deterministic and hedged public-key encryption in the standard model Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Distributed pseudo-random bit generators---a new way to speed-up shared coin tossing Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing - PODC '96 | 2015-09-11 | Paper |
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography Lecture Notes in Computer Science | 2015-08-27 | Paper |
How secure is deterministic encryption? Lecture Notes in Computer Science | 2015-08-27 | Paper |
Interactive Message-Locked Encryption and Secure Deduplication Lecture Notes in Computer Science | 2015-08-27 | Paper |
Efficient probabilistically checkable proofs and applications to approximations Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93 | 2015-05-07 | Paper |
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? Journal of Cryptology | 2015-03-25 | Paper |
A characterization of chameleon hash functions and new, efficient designs Journal of Cryptology | 2015-01-07 | Paper |
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation Lecture Notes in Computer Science | 2015-01-06 | Paper |
The exact security of digital signatures -- how to sign with RSA and Rabin Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Security of symmetric encryption against mass surveillance Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Cryptography from compression functions: the UCE bridge to the ROM Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Policy-Based Signatures Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Instantiating random oracles via UCEs Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Message-locked encryption and secure deduplication Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
RKA security beyond the linear barrier: IBE, encryption and signatures Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
On-line ciphers and the Hash-CBC constructions Journal of Cryptology | 2013-01-04 | Paper |
Semantic security for the wiretap channel Lecture Notes in Computer Science | 2012-09-25 | Paper |
Multi-instance security and its application to password-based cryptography Lecture Notes in Computer Science | 2012-09-25 | Paper |
Standard security does not imply security against selective-opening Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Identity-based (lossy) trapdoor functions and applications Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Cryptography secure against related-key attacks and tampering Lecture Notes in Computer Science | 2011-12-02 | Paper |
Proving computational ability Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation | 2011-08-19 | Paper |
On probabilistic versus deterministic provers in the definition of proofs of knowledge Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation | 2011-08-19 | Paper |
Authenticated and misuse-resistant encryption of key-dependent data Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Identity-based encryption secure against selective opening attack Theory of Cryptography | 2011-05-19 | Paper |
Pseudorandom functions and permutations provably secure against related-key attacks Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Cryptographic agility and its relation to circular encryption Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Robust Encryption Theory of Cryptography | 2010-02-24 | Paper |
Hedged public-key encryption: how to protect against bad randomness Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Format-preserving encryption Selected Areas in Cryptography | 2009-12-09 | Paper |
Security proofs for identity-based identification and signature schemes Journal of Cryptology | 2009-06-30 | Paper |
Authenticated encryption: relations among notions and analysis of the generic composition paradigm Journal of Cryptology | 2009-06-08 | Paper |
Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions Journal of Cryptology | 2009-06-08 | Paper |
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Key Insulation and Intrusion Resilience over a Public Channel Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Hash Functions from Sigma Protocols and Improvements to VSH Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles Lecture Notes in Computer Science | 2009-02-10 | Paper |
Breaking and provably repairing the SSH authenticated encryption scheme ACM Transactions on Information and System Security | 2008-12-21 | Paper |
Transitive Signatures: New Schemes and Proofs IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Multi-Property-Preserving Hash Domain Extension and the EMD Transform Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Identity-Based Multi-signatures from RSA Lecture Notes in Computer Science | 2008-04-17 | Paper |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Improved Security Analyses for CBC MACs Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Unrestricted Aggregate Signatures Automata, Languages and Programming | 2007-11-28 | Paper |
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms Automata, Languages and Programming | 2007-11-28 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
New Proofs for NMAC and HMAC: Security Without Collision-Resistance Lecture Notes in Computer Science | 2007-09-04 | Paper |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold Applicable Algebra in Engineering, Communication and Computing | 2006-09-12 | Paper |
| Authenticated key exchange secure against dictionary attacks | 2006-03-01 | Paper |
| scientific article; zbMATH DE number 5009203 (Why is no real title available?) | 2006-03-01 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| Towards Plaintext-Aware Public-Key Encryption Without Random Oracles | 2005-08-12 | Paper |
| scientific article; zbMATH DE number 2088331 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2086722 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2081087 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2009976 (Why is no real title available?) | 2003-11-26 | Paper |
| scientific article; zbMATH DE number 2009983 (Why is no real title available?) | 2003-11-26 | Paper |
The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme Journal of Cryptology | 2003-08-27 | Paper |
| scientific article; zbMATH DE number 1962139 (Why is no real title available?) | 2003-08-10 | Paper |
Randomness Re-use in Multi-recipient Encryption Schemeas Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
Transitive Signatures Based on Factoring and RSA Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1942419 (Why is no real title available?) | 2003-06-30 | Paper |
A note on negligible functions Journal of Cryptology | 2003-03-25 | Paper |
Uniform generation of NP-witnesses using an NP-oracle Information and Computation | 2003-01-14 | Paper |
| scientific article; zbMATH DE number 1842498 (Why is no real title available?) | 2002-12-08 | Paper |
| scientific article; zbMATH DE number 1303128 (Why is no real title available?) | 2002-10-08 | Paper |
| scientific article; zbMATH DE number 1808214 (Why is no real title available?) | 2002-09-30 | Paper |
| scientific article; zbMATH DE number 1617924 (Why is no real title available?) | 2002-09-01 | Paper |
| scientific article; zbMATH DE number 1775427 (Why is no real title available?) | 2002-08-01 | Paper |
| scientific article; zbMATH DE number 1722691 (Why is no real title available?) | 2002-03-21 | Paper |
| scientific article; zbMATH DE number 1263223 (Why is no real title available?) | 2002-01-29 | Paper |
| The complexity of approximating a nonlinear program | 2001-09-18 | Paper |
| scientific article; zbMATH DE number 1583805 (Why is no real title available?) | 2001-07-03 | Paper |
| scientific article; zbMATH DE number 1583804 (Why is no real title available?) | 2001-07-03 | Paper |
The security of the cipher block chaining message authentication code Journal of Computer and System Sciences | 2001-04-17 | Paper |
| scientific article; zbMATH DE number 1583803 (Why is no real title available?) | 2001-04-03 | Paper |
| scientific article; zbMATH DE number 1583788 (Why is no real title available?) | 2001-04-03 | Paper |
| scientific article; zbMATH DE number 1418315 (Why is no real title available?) | 2000-08-27 | Paper |
| scientific article; zbMATH DE number 1418310 (Why is no real title available?) | 2000-08-24 | Paper |
| scientific article; zbMATH DE number 1418299 (Why is no real title available?) | 2000-07-26 | Paper |
| scientific article; zbMATH DE number 1306876 (Why is no real title available?) | 2000-04-26 | Paper |
| scientific article; zbMATH DE number 1306875 (Why is no real title available?) | 2000-04-26 | Paper |
| scientific article; zbMATH DE number 1418256 (Why is no real title available?) | 2000-03-19 | Paper |
| scientific article; zbMATH DE number 1418300 (Why is no real title available?) | 2000-03-19 | Paper |
| scientific article; zbMATH DE number 1304183 (Why is no real title available?) | 2000-03-07 | Paper |
| scientific article; zbMATH DE number 1406792 (Why is no real title available?) | 2000-03-01 | Paper |
| scientific article; zbMATH DE number 1406782 (Why is no real title available?) | 2000-03-01 | Paper |
Translucent cryptography -- an alternative to key escrow, and its implementation via fractional oblivious transfer Journal of Cryptology | 2000-02-04 | Paper |
| scientific article; zbMATH DE number 1304296 (Why is no real title available?) | 2000-01-12 | Paper |
| scientific article; zbMATH DE number 1263180 (Why is no real title available?) | 1999-07-26 | Paper |
| scientific article; zbMATH DE number 1263181 (Why is no real title available?) | 1999-07-22 | Paper |
| scientific article; zbMATH DE number 1302861 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1302836 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303126 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1302853 (Why is no real title available?) | 1999-06-17 | Paper |
On chromatic sums and distributed resource allocation Information and Computation | 1998-09-27 | Paper |
| scientific article; zbMATH DE number 1107669 (Why is no real title available?) | 1998-06-07 | Paper |
Free Bits, PCPs, and Nonapproximability---Towards Tight Results SIAM Journal on Computing | 1998-05-10 | Paper |
| scientific article; zbMATH DE number 1088254 (Why is no real title available?) | 1998-03-10 | Paper |
| scientific article; zbMATH DE number 1088907 (Why is no real title available?) | 1998-02-19 | Paper |
| scientific article; zbMATH DE number 1088241 (Why is no real title available?) | 1998-01-07 | Paper |
| scientific article; zbMATH DE number 1030978 (Why is no real title available?) | 1997-11-23 | Paper |
| scientific article; zbMATH DE number 1024060 (Why is no real title available?) | 1997-09-24 | Paper |
Linearity testing in characteristic two IEEE Transactions on Information Theory | 1997-08-07 | Paper |
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation Journal of Cryptology | 1997-05-19 | Paper |
The complexity of approximating a nonlinear program Mathematical Programming. Series A. Series B | 1996-02-12 | Paper |
| scientific article; zbMATH DE number 708820 (Why is no real title available?) | 1995-11-06 | Paper |
| scientific article; zbMATH DE number 708823 (Why is no real title available?) | 1995-08-08 | Paper |
How to sign given any trapdoor permutation Journal of the ACM | 1994-08-21 | Paper |
Randomness in interactive proofs Computational Complexity | 1994-05-08 | Paper |
The Complexity of Decision Versus Search SIAM Journal on Computing | 1994-04-27 | Paper |
| scientific article; zbMATH DE number 4191077 (Why is no real title available?) | 1991-01-01 | Paper |
| scientific article; zbMATH DE number 4179279 (Why is no real title available?) | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4191103 (Why is no real title available?) | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4191102 (Why is no real title available?) | 1990-01-01 | Paper |