| Publication | Date of Publication | Type |
|---|
| Second Thoughts on the Second Law | 2023-06-30 | Paper |
| An Algebraic-Geometry Approach to Prime Factorization | 2022-09-23 | Paper |
| Discrete Mathematics | 2022-05-24 | Paper |
| Reversible time travel with freedom of choice | 2021-10-28 | Paper |
| Information-based measure of nonlocality | 2021-03-12 | Paper |
| Device-independent test of causal order and relations to fixed-points | 2021-03-12 | Paper |
| The space of logically consistent classical processes without causal order | 2021-03-12 | Paper |
| Bell Correlations and the Common Future | 2019-01-11 | Paper |
| A patient-independent significance test by means of false-positive rates in selected correlation analysis of brain multimodal monitoring data | 2018-12-17 | Paper |
| Computational tameness of classical non-causal models | 2018-11-28 | Paper |
| Bit Commitment From Nonsignaling Correlations | 2017-07-27 | Paper |
| Multi-User Non-Locality Amplification | 2017-06-08 | Paper |
| An All-or-Nothing Flavor to the Church-Turing Hypothesis | 2017-05-19 | Paper |
| Oblivious transfer and quantum channels as communication resources | 2016-04-18 | Paper |
| Diffie-Hellman Oracles | 2015-11-11 | Paper |
| Non-locality of experimental qutrit pairs | 2014-11-11 | Paper |
| The Hall algebra and the composition monoid. | 2014-10-11 | Paper |
| Classical, quantum and nonsignalling resources in bipartite games | 2013-12-11 | Paper |
| Deterministic quantum non-locality and graph colorings | 2013-12-11 | Paper |
| The impossibility of non-signaling privacy amplification | 2013-12-11 | Paper |
| Towards characterizing the non-locality of entangled quantum states | 2013-12-11 | Paper |
| Ernst Specker and the hidden variables | 2012-09-21 | Paper |
| The non-locality ofnnoisy Popescu–Rohrlich boxes | 2010-12-03 | Paper |
| Efficient device-independent quantum key distribution | 2010-06-01 | Paper |
| Trade-offs in information-theoretic multi-party one-way key agreement | 2009-12-03 | Paper |
| A geometric version of BGP reflection functors | 2009-08-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3392575 | 2009-08-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3392576 | 2009-08-17 | Paper |
| New Monotones and Lower Bounds in Unconditional Two-Party Computation | 2009-02-24 | Paper |
| Worst Case Nonzero-Error Interactive Communication | 2009-02-24 | Paper |
| Simple and Tight Bounds for Information Reconciliation and Privacy Amplification | 2008-03-18 | Paper |
| New Monotones and Lower Bounds in Unconditional Two-Party Computation | 2008-03-17 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| The Hall algebra of a cyclic quiver at $q=0$ | 2007-09-27 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Oblivious Transfer Is Symmetric | 2007-09-24 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Information-theoretic key agreement: from weak to strong secret for free | 2006-03-01 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Secret-key agreement over unauthenticated public channels-part I: definitions and a completeness result | 2005-06-01 | Paper |
| Secret-key agreement over unauthenticated public channels-part III: privacy amplification | 2005-06-01 | Paper |
| Secret-key agreement over unauthenticated public channels-part II: the simulatability condition | 2005-06-01 | Paper |
| Oblivious transfer and privacy amplification | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434899 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408003 | 2003-07-01 | Paper |
| Linking classical and quantum key agreement: Is there a classical analog to bound entanglement? | 2003-05-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536263 | 2003-01-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4949336 | 2002-12-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536820 | 2002-10-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249284 | 2001-03-18 | Paper |
| The Diffie-Hellman protocol | 2000-05-08 | Paper |
| Unconditionally secure key agreement and the intrinsic conditional information | 1999-11-21 | Paper |
| The Relationship Between Breaking the Diffie--Hellman Protocol and Computing Discrete Logarithms | 1999-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249629 | 1999-09-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250904 | 1999-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364560 | 1998-11-03 | Paper |