| Publication | Date of Publication | Type |
|---|
| \textsf{Testudo}: linear time prover SNARKs with constant size proofs and square root size universal setup | 2024-10-16 | Paper |
| Witness-authenticated key exchange, revisited: extensions to groups, improved models, simpler constructions | 2024-07-17 | Paper |
On the impossibility of algebraic vector commitments in pairing-free groups Theory of Cryptography | 2023-08-14 | Paper |
Escrow protocols for cryptocurrencies: how to buy physical goods using Bitcoin Financial Cryptography and Data Security | 2021-03-17 | Paper |
| On the cryptographic deniability of the Signal protocol | 2021-02-23 | Paper |
| Publicly evaluatable perceptual hashing | 2021-02-23 | Paper |
| Using level-1 homomorphic encryption to improve threshold DSA signatures for Bitcoin wallet security | 2020-03-02 | Paper |
| Fine-grained secure computation | 2018-12-06 | Paper |
| Homomorphic secret sharing from Paillier encryption | 2018-11-07 | Paper |
| Efficient rational proofs for space bounded computations | 2017-10-27 | Paper |
Achieving independence efficiently and securely Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing - PODC '95 | 2017-09-29 | Paper |
Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security Applied Cryptography and Network Security | 2016-10-04 | Paper |
Automata evaluation and text search protocols with simulation-based security Journal of Cryptology | 2016-06-01 | Paper |
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing - PODC '98 | 2016-03-02 | Paper |
Sequentially composable rational proofs Lecture Notes in Computer Science | 2015-12-11 | Paper |
Robust and efficient sharing of RSA functions Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Algebraic (trapdoor) one-way functions: constructions and applications Theoretical Computer Science | 2015-10-08 | Paper |
The round complexity of verifiable secret sharing and secure multicast Proceedings of the thirty-third annual ACM symposium on Theory of computing | 2015-02-27 | Paper |
Robust threshold DSS signatures Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Generalizing homomorphic MACs for arithmetic circuits Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption Cryptography and Coding | 2014-01-17 | Paper |
Fully homomorphic message authenticators Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Hard-core predicates for a Diffie-Hellman problem over finite fields Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Quadratic span programs and succinct NIZKs without PCPs Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
The generalized randomized iterate and its application to new efficient constructions of uowhfs from regular one-way functions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Algebraic (Trapdoor) one-way functions and their applications Theory of Cryptography | 2013-03-18 | Paper |
Computational extractors and pseudorandomness Theory of Cryptography | 2012-06-15 | Paper |
Verifiable delegation of computation over large datasets Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Constructing certificateless encryption and ID-based encryption from ID-based key agreement Lecture Notes in Computer Science | 2010-11-26 | Paper |
Non-interactive verifiable computing: outsourcing computation to untrusted workers Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Lower bounds on the efficiency of encryption and digital signature schemes Proceedings of the thirty-fifth annual ACM symposium on Theory of computing | 2010-08-16 | Paper |
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead Applied Cryptography and Network Security | 2010-07-06 | Paper |
Secure network coding over the integers Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Text search protocols with simulation based security Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Making the Diffie-Hellman Protocol Identity-Based Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack Journal of Cryptology | 2010-03-01 | Paper |
Secure multiplication of shared secrets in the exponent Information Processing Letters | 2009-12-18 | Paper |
More on key wrapping Selected Areas in Cryptography | 2009-12-09 | Paper |
New approaches for deniable authentication Journal of Cryptology | 2009-11-13 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
Foundations of Security Analysis and Design II Lecture Notes in Computer Science | 2009-05-14 | Paper |
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM Lecture Notes in Computer Science | 2008-05-06 | Paper |
Tag-KEM/DEM: A new framework for hybrid encryption Journal of Cryptology | 2008-04-16 | Paper |
Threshold RSA for Dynamic and Ad-Hoc Groups Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Faster and Shorter Password-Authenticated Key Exchange Theory of Cryptography | 2008-03-05 | Paper |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Independent Zero-Knowledge Sets Automata, Languages and Programming | 2007-09-11 | Paper |
Improved On-Line/Off-Line Threshold Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Secure distributed key generation for discrete-log based cryptosystems Journal of Cryptology | 2007-05-24 | Paper |
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring Theoretical Computer Science | 2007-02-26 | Paper |
Provably secure threshold password-authenticated key exchange Journal of Computer and System Sciences | 2006-10-05 | Paper |
| Computing inverses over a shared secret modulus | 2006-03-01 | Paper |
An improved pseudo-random generator based on the discrete logarithm problem Journal of Cryptology | 2006-02-08 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Bounds on the Efficiency of Generic Cryptographic Constructions SIAM Journal on Computing | 2005-10-28 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| scientific article; zbMATH DE number 2086695 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2009978 (Why is no real title available?) | 2003-11-26 | Paper |
| scientific article; zbMATH DE number 2009977 (Why is no real title available?) | 2003-11-26 | Paper |
| scientific article; zbMATH DE number 1962164 (Why is no real title available?) | 2003-08-10 | Paper |
| scientific article; zbMATH DE number 1942420 (Why is no real title available?) | 2003-06-30 | Paper |
Paillier's trapdoor function hides up to \(O(n)\) bits Journal of Cryptology | 2003-03-25 | Paper |
| scientific article; zbMATH DE number 1878326 (Why is no real title available?) | 2003-03-09 | Paper |
Robust threshold DSS signatures Information and Computation | 2003-01-14 | Paper |
How to sign digital streams Information and Computation | 2003-01-14 | Paper |
| scientific article; zbMATH DE number 1759796 (Why is no real title available?) | 2002-08-06 | Paper |
Securing threshold cryptosystems against chosen ciphertext attack Journal of Cryptology | 2002-06-27 | Paper |
| scientific article; zbMATH DE number 1722681 (Why is no real title available?) | 2002-03-21 | Paper |
| scientific article; zbMATH DE number 1676641 (Why is no real title available?) | 2001-11-25 | Paper |
New efficient and secure protocols for verifiable signature sharing and other applications Journal of Computer and System Sciences | 2001-06-10 | Paper |
RSA-based undeniable signatures Journal of Cryptology | 2000-12-21 | Paper |
Secure distributed storage and retrieval Theoretical Computer Science | 2000-08-21 | Paper |
| scientific article; zbMATH DE number 1418290 (Why is no real title available?) | 2000-07-19 | Paper |
| scientific article; zbMATH DE number 1302841 (Why is no real title available?) | 2000-03-09 | Paper |
| scientific article; zbMATH DE number 1304079 (Why is no real title available?) | 2000-03-07 | Paper |
Robust and efficient sharing of RSA functions. Journal of Cryptology | 2000-01-01 | Paper |
Securing threshold cryptosystems against chosen ciphertext attack Lecture Notes in Computer Science | 1999-09-09 | Paper |
Secure Hash-and-Sign Signatures Without the Random Oracle Advances in Cryptology — EUROCRYPT ’99 | 1999-01-01 | Paper |
| scientific article; zbMATH DE number 1189071 (Why is no real title available?) | 1998-08-13 | Paper |
| scientific article; zbMATH DE number 1088231 (Why is no real title available?) | 1998-05-12 | Paper |
| scientific article; zbMATH DE number 1088234 (Why is no real title available?) | 1998-03-17 | Paper |