| Publication | Date of Publication | Type |
|---|
On security notions for encryption in a quantum world Designs, Codes and Cryptography | 2025-10-30 | Paper |
| Semi-quantum copy-protection and more | 2024-08-15 | Paper |
| Practical construction for secure trick-taking games even with cards set aside | 2024-07-17 | Paper |
| GeT a CAKE: \underline{Ge}neric \underline{T}ransformations from \underline{K}ey encaspulation mechanisms to password \underline{A}uthenticated \underline{K}ey \underline{E}xchanges | 2023-11-10 | Paper |
| Shorter and faster identity-based signatures with tight security in the (Q)ROM from lattices | 2023-11-09 | Paper |
On security notions for encryption in a quantum world Lecture Notes in Computer Science | 2023-08-14 | Paper |
Dispelling myths on superposition attacks: formal security model and attack analyses Provable and Practical Security | 2023-03-21 | Paper |
| Embedding the UC model into the IITM model | 2022-08-30 | Paper |
| Almost optimal oblivious transfer from QA-NIZK | 2022-07-01 | Paper |
Correction to: ``Dispelling myths on superposition attacks: formal security model and attack analyses'' Designs, Codes and Cryptography | 2022-06-08 | Paper |
Dispelling myths on superposition attacks: formal security model and attack analyses Designs, Codes and Cryptography | 2022-03-31 | Paper |
Hardware security without secure hardware: how to decrypt with a password and a server Theoretical Computer Science | 2021-11-18 | Paper |
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions Algorithmica | 2021-02-01 | Paper |
Structure-preserving smooth projective hashing Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Adaptive oblivious transfer and generalization Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
How to (carefully) breach a service contract? The New Codebreakers | 2016-05-02 | Paper |
Easing Coppersmith methods using analytic combinatorics: applications to public-key cryptography with weak pseudorandomness Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Mitigating server breaches in password-based authentication: secure and efficient solutions Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Generic construction of UC-secure oblivious transfer Applied Cryptography and Network Security | 2016-03-10 | Paper |
Non-Interactive Zero-Knowledge Proofs of Non-Membership Lecture Notes in Computer Science | 2016-03-02 | Paper |
Composition of password-based protocols Formal Methods in System Design | 2014-06-30 | Paper |
Analysis and improvement of Lindell's UC-secure commitment schemes Applied Cryptography and Network Security | 2014-01-24 | Paper |
SPHF-friendly non-interactive commitments Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
New techniques for SPHFs and efficient one-round PAKE protocols Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
| Transforming password protocols to compose | 2012-08-31 | Paper |
Contributory password-authenticated group key exchange with join capability Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Flexible group key exchange with on-demand computation of subgroup keys Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Smooth Projective Hashing for Conditionally Extractable Commitments Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Optimal Randomness Extraction from a Diffie-Hellman Element Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Distributed Public-Key Cryptography from Weak Secrets Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |