| Publication | Date of Publication | Type |
|---|
| Experiment artifacts for ASIACCS 2025 submission #175 | 2025-01-10 | Dataset |
| Conflict optimization for binary CSP applied to minimum partition into plane subgraphs and graph coloring | 2024-07-26 | Paper |
| Practical construction for secure trick-taking games even with cards set aside | 2024-07-17 | Paper |
| Beedroids: how luminous autonomous swarms of UAVs can save the world? | 2024-05-16 | Paper |
| Local search with weighting schemes for the CG:SHOP 2022 competition (CG challenge) | 2024-05-14 | Paper |
| Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm | 2024-03-14 | Paper |
| Perpetual torus exploration by myopic luminous robots | 2023-10-17 | Paper |
| Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality | 2023-10-17 | Paper |
| Physical ZKP protocols for Nurimisaki and Kurodoko | 2023-09-07 | Paper |
| Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric | 2023-08-14 | Paper |
| Hide a liar: card-based ZKP protocol for Usowan | 2023-08-04 | Paper |
| Physical zero-knowledge proof for Makaro | 2023-08-02 | Paper |
| Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures | 2023-08-02 | Paper |
| Shadoks Approach to Low-Makespan Coordinated Motion Planning | 2023-06-26 | Paper |
| Perpetual torus exploration by myopic luminous robots | 2023-06-12 | Paper |
| Card-based ZKP protocol for Nurimisaki | 2023-06-12 | Paper |
| Physical Zero-Knowledge Proof for Suguru Puzzle | 2023-03-21 | Paper |
| Secure cumulative reward maximization in linear stochastic bandits | 2023-03-21 | Paper |
| Card-based ZKP protocols for Takuzu and Juosan | 2023-02-07 | Paper |
| Finding water on Poleless using melomaniac myopic chameleon robots | 2023-02-07 | Paper |
| A physical ZKP for Slitherlink: how to perform physical topology-preserving computation | 2022-08-30 | Paper |
| Secure best arm identification in multi-armed bandits | 2022-08-30 | Paper |
| Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes | 2022-07-08 | Paper |
| Generic plaintext equality and inequality proofs | 2022-06-17 | Paper |
| Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle | 2022-06-08 | Paper |
| SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits | 2022-05-16 | Paper |
| Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori | 2022-03-22 | Paper |
| How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition | 2021-09-27 | Paper |
| A faster cryptographer's Conspiracy Santa | 2020-09-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3305731 | 2020-08-11 | Paper |
| About blockchain interoperability | 2020-08-04 | Paper |
| Optimal Threshold Padlock Systems | 2020-04-24 | Paper |
| Infinite grid exploration by disoriented robots | 2020-03-03 | Paper |
| Interactive physical zero-knowledge proof for Norinori | 2020-02-24 | Paper |
| Efficient invisible and unlinkable sanitizable signatures | 2020-01-28 | Paper |
| Computing AES related-key differential characteristics with constraint programming | 2020-01-20 | Paper |
| DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain | 2019-12-12 | Paper |
| Anonymizable ring signature without pairing | 2018-12-07 | Paper |
| Verifiable private polynomial evaluation | 2018-11-07 | Paper |
| Revisiting AES related-key differential attacks with constraint programming | 2018-10-19 | Paper |
| Formal analysis and offline monitoring of electronic exams | 2017-09-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5282806 | 2017-07-17 | Paper |
| Formal verification of mobile robot protocols | 2017-06-22 | Paper |
| Related-Key Cryptanalysis of Midori | 2016-12-21 | Paper |
| Automated proofs of block cipher modes of operation | 2016-05-26 | Paper |
| On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus | 2015-12-15 | Paper |
| Comparison of mean hitting times for a degree-biased random walk | 2014-05-06 | Paper |
| Formal Verification of e-Auction Protocols | 2013-08-06 | Paper |
| Brandt’s Fully Private Auction Protocol Revisited | 2013-06-07 | Paper |
| On Unique Decomposition of Processes in the Applied π-Calculus | 2013-03-18 | Paper |
| Analysis of Random Walks Using Tabu Lists | 2012-09-26 | Paper |
| Automated Verification of Block Cipher Modes of Operation, an Improved Method | 2012-06-08 | Paper |
| Vote-Independence: A Powerful Privacy Notion for Voting Protocols | 2012-06-08 | Paper |
| Benaloh's dense probabilistic encryption revisited | 2011-06-29 | Paper |
| Automated proofs for asymmetric encryption | 2011-06-03 | Paper |
| Automated proofs for asymmetric encryption | 2010-03-09 | Paper |
| Automated security proof for symmetric encryption modes | 2010-01-14 | Paper |
| Comparing State Spaces in Automatic Security Protocol Analysis | 2009-06-09 | Paper |
| Symbolic protocol analysis for monoidal equational theories | 2008-04-16 | Paper |
| Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or | 2007-09-11 | Paper |
| Intruder deduction for the equational theory of abelian groups with distributive encryption | 2007-04-16 | Paper |
| Term Rewriting and Applications | 2005-11-11 | Paper |