| Publication | Date of Publication | Type |
|---|
| An improved threshold homomorphic cryptosystem based on class groups | 2025-01-10 | Paper |
| Phoenix: secure computation in an unstable network with dropouts and comebacks | 2024-11-22 | Paper |
| Secure communication in dynamic incomplete networks | 2024-11-22 | Paper |
| Broadcast-optimal two round MPC with asynchronous peer-to-peer channels | 2024-10-16 | Paper |
| Broadcast-optimal four-round MPC in the plain model | 2024-08-02 | Paper |
| Secure multiparty computation from threshold encryption based on class groups | 2024-02-02 | Paper |
| Minimizing setup in broadcast-optimal two round MPC | 2023-12-08 | Paper |
| Vector commitments over rings and compressed \(\varSigma \)-protocols | 2023-08-14 | Paper |
| On access control encryption without sanitization | 2023-07-25 | Paper |
| An algebraic framework for silent preprocessing with trustless setup and active security | 2023-07-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6107250 | 2023-07-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6107259 | 2023-07-03 | Paper |
| Improved single-round secure multiplication using regenerating codes | 2023-05-12 | Paper |
| Information-theoretically secure MPC against mixed dynamic adversaries | 2023-03-31 | Paper |
| Asymptotically good multiplicative LSSS over Galois rings and applications to MPC over \(\mathbb{Z}/p^k\mathbb{Z} \) | 2023-03-29 | Paper |
| Fast threshold ECDSA with honest majority | 2022-12-16 | Paper |
| Black-box transformations from passive to covert security with public verifiability | 2022-11-09 | Paper |
| Broadcast-optimal two round MPC with an honest majority | 2022-04-22 | Paper |
| Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices | 2022-04-21 | Paper |
| Stronger security and constructions of multi-designated verifier signatures | 2022-03-23 | Paper |
| Two-round \(n\)-out-of-\(n\) and multi-signatures and trapdoor commitment from lattices | 2021-12-21 | Paper |
| Oblivious TLS via multi-party computation | 2021-12-20 | Paper |
| Balancing privacy and accountability in blockchain identity management | 2021-12-20 | Paper |
| Proofs of replicated storage without timing assumptions | 2020-05-20 | Paper |
| Efficient UC commitment extension with homomorphism for free (and applications) | 2020-05-05 | Paper |
| Efficient information-theoretic secure multiparty computation over \(\mathbb{Z}/p^k\mathbb{Z}\) via Galois rings | 2020-04-30 | Paper |
| Communication lower bounds for statistically secure MPC, with or without preprocessing | 2020-03-09 | Paper |
| Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures | 2020-03-09 | Paper |
| Multiple encryption with minimum key | 2019-10-10 | Paper |
| Continuous NMC secure against permutations and overwrites, with applications to CCA secure commitments | 2018-12-06 | Paper |
| More efficient commitments from structured lattice assumptions | 2018-10-17 | Paper |
| Yet another compiler for active security or: efficient MPC over arbitrary rings | 2018-09-26 | Paper |
| \(\mathrm{SPD}\mathbb {Z}_{2^k}\): efficient MPC \(\mod 2^k\) for dishonest majority | 2018-09-26 | Paper |
| Compact zero-knowledge proofs of small Hamming weight | 2018-05-29 | Paper |
| Linear-time non-malleable codes in the bit-wise independent tampering model | 2018-03-16 | Paper |
| Resource-efficient OT combiners with active security | 2018-01-19 | Paper |
| Amortized complexity of zero-knowledge proofs revisited: achieving linear soundness slack | 2017-06-13 | Paper |
| Bounded tamper resilience: how to go beyond the algebraic barrier | 2017-03-02 | Paper |
| Access control encryption: enforcing information flow with cryptography | 2016-12-22 | Paper |
| Oblivious transfer from any non-trivial elastic noisy channel via secret key agreement | 2016-12-21 | Paper |
| Rate-1, linear time and additively homomorphic UC commitments | 2016-11-09 | Paper |
| How to prove knowledge of small secrets | 2016-11-09 | Paper |
| On the communication required for unconditionally secure multiplication | 2016-10-27 | Paper |
| Better preprocessing for secure multiparty computation | 2016-10-04 | Paper |
| Unconditionally secure computation with reduced interaction | 2016-07-15 | Paper |
| Non-interactive verifiable secret sharing for monotone circuits | 2016-06-22 | Paper |
| Fast Oblivious AES A Dedicated Application of the MiniMac Protocol | 2016-06-22 | Paper |
| How to re-use a one-time pad safely and almost optimally even if \(\mathrm P=\mathrm{NP}\) | 2016-04-15 | Paper |
| Adaptively secure multi-party computation from LWE (via equivocal FHE) | 2016-04-13 | Paper |
| On public key encryption from noisy codewords | 2016-04-13 | Paper |
| Efficient leakage resilient circuit compilers | 2016-03-02 | Paper |
| New generation of secure and practical RSA-based signatures | 2015-11-11 | Paper |
| Superposition attacks on cryptographic protocols | 2015-09-30 | Paper |
| Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions | 2015-09-30 | Paper |
| Adaptive versus Static Security in the UC Model | 2015-09-29 | Paper |
| The Chaining Lemma and its application | 2015-09-24 | Paper |
| On the orthogonal vector problem and the feasibility of unconditionally secure leakage-resilient computation | 2015-09-24 | Paper |
| On the security of distributed multiprime RSA | 2015-09-11 | Paper |
| Additively homomorphic UC commitments with optimal amortized overhead | 2015-08-27 | Paper |
| Secure multiparty computation and secret sharing | 2015-08-06 | Paper |
| Compact VSS and efficient homomorphic UC commitments | 2015-01-06 | Paper |
| Secure identification and QKD in the bounded-quantum-storage model | 2014-12-02 | Paper |
| Practical covertly secure MPC for dishonest majority -- or: breaking the SPDZ limits | 2014-10-16 | Paper |
| Publicly auditable secure multi-party computation | 2014-10-14 | Paper |
| An empirical study and some improvements of the MiniMac protocol for secure computation | 2014-10-14 | Paper |
| On the complexity of verifiable secret sharing and multiparty computation | 2014-09-26 | Paper |
| On the amortized complexity of zero-knowledge protocols | 2014-09-25 | Paper |
| New convertible undeniable signature schemes | 2014-08-20 | Paper |
| Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption | 2014-05-27 | Paper |
| Secure key management in the cloud | 2014-01-17 | Paper |
| Unconditionally secure and universally composable commitments from physical assumptions | 2013-12-10 | Paper |
| Bounded tamper resilience: how to go beyond the algebraic barrier | 2013-12-10 | Paper |
| Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract) | 2013-09-17 | Paper |
| Constant-overhead secure computation of Boolean circuits using preprocessing | 2013-03-18 | Paper |
| On the amortized complexity of zero knowledge protocols for multiplicative relations | 2012-11-06 | Paper |
| Implementing AES via an actively/covertly secure dishonest-majority MPC protocol | 2012-09-25 | Paper |
| Multiparty Computation from Somewhat Homomorphic Encryption | 2012-09-25 | Paper |
| Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions | 2012-09-25 | Paper |
| DDH-like assumptions based on extension rings | 2012-07-20 | Paper |
| Secure two-party computation with low communication | 2012-06-15 | Paper |
| Secure computation, I/O-efficient algorithms and distributed signatures | 2012-06-08 | Paper |
| Semi-homomorphic encryption and multiparty computation | 2011-05-27 | Paper |
| Perfectly secure oblivious RAM without random oracles | 2011-05-19 | Paper |
| Quantum communication attacks on classical cryptographic protocols. (Invited talk) | 2011-05-19 | Paper |
| Multiparty computation for dishonest majority: from passive to active security at low cost | 2010-08-24 | Paper |
| Secure Multiparty AES | 2010-08-17 | Paper |
| Non-interactive and reusable non-malleable commitment schemes | 2010-08-16 | Paper |
| Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography | 2010-06-01 | Paper |
| Fundamentals of Computation Theory | 2010-04-20 | Paper |
| An extended quadratic Frobenius primality test with average and worst case error estimates. | 2010-04-20 | Paper |
| From Passive to Covert Security at Low Cost | 2010-02-24 | Paper |
| Efficient, Robust and Constant-Round Distributed RSA Key Generation | 2010-02-24 | Paper |
| On the necessary and sufficient assumptions for UC computation | 2010-02-24 | Paper |
| Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems | 2010-02-24 | Paper |
| Secure multiparty computation goes live | 2010-01-07 | Paper |
| Quantum-Secure Coin-Flipping and Applications | 2009-12-15 | Paper |
| On the Amortized Complexity of Zero-Knowledge Protocols | 2009-10-20 | Paper |
| Improving the Security of Quantum Protocols via Commit-and-Open | 2009-10-20 | Paper |
| A correction to `efficient and secure comparison for on-line auctions' | 2009-10-12 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| On the Theory and Practice of Personal Digital Signatures | 2009-03-24 | Paper |
| Asynchronous Multiparty Computation: Theory and Implementation | 2009-03-24 | Paper |
| Scalable and Unconditionally Secure Multiparty Computation | 2009-03-10 | Paper |
| A Tight High-Order Entropic Quantum Uncertainty Relation with Applications | 2009-03-10 | Paper |
| Secure Identification and QKD in the Bounded-Quantum-Storage Model | 2009-03-10 | Paper |
| Efficient and Secure Comparison for On-Line Auctions | 2009-03-06 | Paper |
| Universally Composable Multiparty Computation with Partially Isolated Parties | 2009-03-03 | Paper |
| Homomorphic encryption and secure comparison | 2009-01-15 | Paper |
| Cryptography in the Bounded-Quantum-Storage Model | 2008-12-22 | Paper |
| Theory and Practice of Multiparty Computation | 2008-11-27 | Paper |
| A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation | 2008-09-09 | Paper |
| Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography | 2008-06-13 | Paper |
| Secure Protocols with Asymmetric Trust | 2008-05-15 | Paper |
| RFID Security: Tradeoffs between Security and Efficiency | 2008-04-24 | Paper |
| Public-Key Encryption with Non-interactive Opening | 2008-04-24 | Paper |
| Isolated Proofs of Knowledge and Isolated Zero Knowledge | 2008-04-15 | Paper |
| A Quantum Cipher with Near Optimal Key-Recycling | 2008-03-17 | Paper |
| Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator | 2008-03-17 | Paper |
| Atomic Secure Multi-party Multiplication with Low Communication | 2007-11-29 | Paper |
| Non-interactive Proofs for Integer Multiplication | 2007-11-29 | Paper |
| A “proof-reading” of Some Issues in Cryptography | 2007-11-28 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Efficient algorithms for the gcd and cubic residuosity in the ring of Eisenstein integers | 2007-10-19 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Simplified Threshold RSA with Adaptive and Proactive Security | 2007-09-24 | Paper |
| Unclonable Group Identification | 2007-09-24 | Paper |
| Oblivious Transfer and Linear Functions | 2007-09-04 | Paper |
| Scalable Secure Multiparty Computation | 2007-09-04 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| An extended quadratic Frobenius primality test with average- and worst-case error estimate | 2007-01-24 | Paper |
| Multiparty computation, an introduction | 2006-09-25 | Paper |
| Efficient concurrent zero-knowledge in the auxiliary string model | 2006-03-01 | Paper |
| General secure multi-party computation from any linear secret-sharing scheme | 2006-03-01 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Adaptive versus non-adaptive security of multi-party protocols | 2004-10-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737249 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043932 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450762 | 2004-02-16 | Paper |
| A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409136 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409144 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783722 | 2002-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783743 | 2002-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149671 | 2002-09-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536817 | 2002-08-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724587 | 2002-06-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778854 | 2002-03-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778847 | 2002-03-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707429 | 2001-12-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249348 | 2001-07-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4527011 | 2001-02-28 | Paper |
| Short non-interactive cryptographic proofs | 2000-12-21 | Paper |
| On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions | 2000-03-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4266492 | 2000-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4940695 | 2000-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4934739 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4934740 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4950056 | 2000-01-01 | Paper |
| Two-key triple encryption | 1999-09-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250770 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250897 | 1999-06-17 | Paper |
| Statistical secrecy and multibit commitments | 1998-08-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343443 | 1997-12-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4365735 | 1997-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341752 | 1997-11-02 | Paper |
| On the existence of statistically hiding bit commitment schemes and fail-stop signatures | 1997-08-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341736 | 1997-07-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343445 | 1997-07-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4880146 | 1997-01-06 | Paper |
| Practical and provably secure release of a secret and exchange of signatures | 1996-07-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4322849 | 1995-09-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4318709 | 1995-09-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4314050 | 1995-07-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279688 | 1994-12-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279699 | 1994-03-10 | Paper |
| Convertible Undeniable Signatures | 1994-03-07 | Paper |
| Average Case Error Estimates for the Strong Probable Prime Test | 1993-11-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4035738 | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3212279 | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3212280 | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5752488 | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3826475 | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3792624 | 1988-01-01 | Paper |
| Concatenated group codes and their exponents | 1987-01-01 | Paper |