| Publication | Date of Publication | Type |
|---|
Beyond Uber: instantiating generic groups via PGGs Theory of Cryptography | 2023-08-14 | Paper |
Simpler constructions of asymmetric primitives from obfuscation | 2022-07-06 | Paper |
Towards defeating backdoored random oracles: indifferentiability with bounded adaptivity | 2022-03-23 | Paper |
The key-dependent message security of key-alternating Feistel ciphers | 2021-12-20 | Paper |
Password hashing and preprocessing | 2021-12-08 | Paper |
Multilinear maps from obfuscation Journal of Cryptology | 2020-06-15 | Paper |
Combiners for backdoored random oracles | 2018-09-26 | Paper |
Indifferentiable authenticated encryption | 2018-09-12 | Paper |
Graded encoding schemes from obfuscation | 2018-05-29 | Paper |
Modeling random oracles under unpredictable queries Fast Software Encryption | 2018-05-09 | Paper |
Private functional encryption: indistinguishability-based definitions and constructions from obfuscation Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Polly cracker, revisited Designs, Codes and Cryptography | 2016-05-19 | Paper |
Multilinear maps from obfuscation Theory of Cryptography | 2016-03-23 | Paper |
The Related-Key Security of Iterated Even–Mansour Ciphers Fast Software Encryption | 2015-09-18 | Paper |
The related-key analysis of Feistel constructions Fast Software Encryption | 2015-09-18 | Paper |
A more cautious approach to security against mass surveillance Fast Software Encryption | 2015-09-18 | Paper |
Random-oracle uninstantiability from indistinguishability obfuscation Theory of Cryptography | 2015-07-06 | Paper |
Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption Cryptography and Coding | 2014-01-17 | Paper |
Ideal-cipher (ir)reducibility for blockcipher-based hash functions Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Robust encryption, revisited Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
On the semantic security of functional encryption schemes Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Delegatable homomorphic encryption with applications to secure outsourcing of computation Lecture Notes in Computer Science | 2012-06-08 | Paper |
Polly cracker, revisited Lecture Notes in Computer Science | 2011-12-02 | Paper |
On cipher-dependent related-key attacks in the ideal-cipher model Fast Software Encryption | 2011-07-07 | Paper |
Strong Knowledge Extractors for Public-Key Encryption Schemes Information Security and Privacy | 2010-10-25 | Paper |
Relations among notions of complete non-malleability: indistinguishability characterisation and efficient construction without random oracles Information Security and Privacy | 2010-10-25 | Paper |
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Certified Encryption Revisited Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Generic constructions of identity-based and certificateless kEMs Journal of Cryptology | 2008-05-06 | Paper |
Secure Cryptographic Workflow in the Standard Model Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Randomness Reuse: Extensions and Improvements Cryptography and Coding | 2008-03-07 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |