| Publication | Date of Publication | Type |
|---|
Towards a Unified Security Model for Physically Unclonable Functions Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
On constructing homomorphic encryption schemes from coding theory Cryptography and Coding | 2011-12-16 | Paper |
Recyclable PUFs: Logically Reconfigurable PUFs Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Secure set intersection with untrusted hardware tokens Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Automatic generation of \(\Sigma\)-protocols Public Key Infrastructures, Services and Applications | 2011-02-04 | Paper |
Cryptography meets hardware: selected topics of hardware-based cryptography (invited talk) Cryptology and Network Security | 2010-12-07 | Paper |
Memory leakage-resilient encryption based on physically unclonable functions Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima Cryptology and Network Security | 2009-11-26 | Paper |
Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data Lecture Notes in Computer Science | 2009-03-11 | Paper |
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Universally Composable Security Analysis of TLS Provable Security | 2009-01-27 | Paper |
Property-Based Attestation without a Trusted Third Party Lecture Notes in Computer Science | 2008-11-20 | Paper |
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption Lecture Notes in Computer Science | 2008-06-17 | Paper |
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting Financial Cryptography and Data Security | 2008-03-07 | Paper |
Fingercasting–Joint Fingerprinting and Decryption of Broadcast Messages Transactions on Data Hiding and Multimedia Security II | 2007-11-13 | Paper |
Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages Information Security and Privacy | 2007-09-07 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |
Optimized Self-Synchronizing Mode of Operation Fast Software Encryption | 2004-08-12 | Paper |
scientific article; zbMATH DE number 1893221 (Why is no real title available?) | 2003-04-06 | Paper |
scientific article; zbMATH DE number 1893227 (Why is no real title available?) | 2003-04-06 | Paper |
scientific article; zbMATH DE number 1759346 (Why is no real title available?) | 2002-11-28 | Paper |
scientific article; zbMATH DE number 1722682 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1583811 (Why is no real title available?) | 2001-12-18 | Paper |
On the Performance of Hyperelliptic Cryptosystems Advances in Cryptology — EUROCRYPT ’99 | 1999-06-17 | Paper |