| Publication | Date of Publication | Type |
|---|
| QCB: efficient quantum-secure authenticated encryption | 2023-05-12 | Paper |
| MuSig2: simple two-round Schnorr multi-signatures | 2022-03-31 | Paper |
| Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model | 2022-03-23 | Paper |
| The key-dependent message security of key-alternating Feistel ciphers | 2021-12-20 | Paper |
| The \texttt{Deoxys} AEAD family | 2021-08-10 | Paper |
| Simple Schnorr multi-signatures with applications to bitcoin | 2019-09-12 | Paper |
| Minimizing the two-round Even-Mansour cipher | 2018-11-01 | Paper |
| Analysis of the single-permutation encrypted Davies-Meyer construction | 2018-10-26 | Paper |
| Strengthening the known-key security notion for block ciphers | 2018-05-09 | Paper |
| ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
| Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient | 2017-10-27 | Paper |
| Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers | 2016-11-30 | Paper |
| EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC | 2016-11-30 | Paper |
| Security amplification for the composition of block ciphers: simpler proofs and new results | 2016-04-13 | Paper |
| How to build an ideal cipher: the indifferentiability of the Feistel construction | 2016-04-07 | Paper |
| Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing | 2016-03-23 | Paper |
| The iterated random permutation problem with applications to cascade encryption | 2015-12-10 | Paper |
| Tweaking Even-Mansour ciphers | 2015-12-10 | Paper |
| On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks | 2015-09-30 | Paper |
| Security analysis of key-alternating Feistel ciphers | 2015-09-18 | Paper |
| Tweakable blockciphers with asymptotically optimal security | 2015-09-18 | Paper |
| Relaxing full-codebook security: a refined analysis of key-length extension schemes | 2015-09-18 | Paper |
| Minimizing the two-round Even-Mansour cipher | 2014-08-07 | Paper |
| On the lossiness of the Rabin trapdoor function | 2014-03-25 | Paper |
| How to construct an ideal cipher from a small set of public permutations | 2013-12-10 | Paper |
| New Constructions and Applications of Trapdoor DDH Groups | 2013-04-19 | Paper |
| An asymptotically tight security analysis of the iterated Even-Mansour cipher | 2013-03-19 | Paper |
| A robust and plaintext-aware variant of signed ElGamal encryption | 2013-03-18 | Paper |
| On the exact security of Schnorr-type signatures in the random oracle model | 2012-06-29 | Paper |
| On the public indifferentiability and correlation intractability of the 6-round Feistel construction | 2012-06-15 | Paper |
| A domain extender for the ideal cipher | 2010-02-24 | Paper |
| Building Secure Block Ciphers on Generic Attacks Assumptions | 2009-11-03 | Paper |
| Good Variants of HB + Are Hard to Find | 2009-02-12 | Paper |
| The Random Oracle Model and the Ideal Cipher Model Are Equivalent | 2009-02-10 | Paper |
| Hash Functions and RFID Tags: Mind the Gap | 2009-01-09 | Paper |
| PRESENT: An Ultra-Lightweight Block Cipher | 2008-09-16 | Paper |
| Security Analysis of Constructions Combining FIL Random Oracles | 2008-09-16 | Paper |
| How to Encrypt with the LPN Problem | 2008-08-19 | Paper |
| Looking Back at a New Hash Function | 2008-07-08 | Paper |
| : Increasing the Security and Efficiency of | 2008-04-15 | Paper |