| Publication | Date of Publication | Type |
|---|
| Round efficient Byzantine agreement from VDFs | 2025-01-10 | Paper |
| Shared-custodial password-authenticated deterministic wallets | 2025-01-10 | Paper |
| Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking | 2024-11-13 | Paper |
| From random probing to noisy leakages without field-size dependence | 2024-11-13 | Paper |
| Individual cryptography | 2024-02-02 | Paper |
| Combined fault and leakage resilience: composability, constructions and compiler | 2024-02-02 | Paper |
| Putting the online phase on a diet: covert security from short MACs | 2023-10-04 | Paper |
| Continuously non-malleable codes against bounded-depth tampering | 2023-08-21 | Paper |
| Financially backed covert security | 2023-08-10 | Paper |
| On the related-key attack security of authenticated encryption schemes | 2023-07-25 | Paper |
| Generalized channels from limited blockchain scripts and adaptor signatures | 2023-05-12 | Paper |
| Towards tight random probing security | 2022-04-22 | Paper |
| Two-party adaptor signatures from identification schemes | 2021-12-21 | Paper |
| Generic compiler for publicly verifiable covert multi-party computation | 2021-12-08 | Paper |
| Continuously non-malleable codes in the split-state model | 2020-11-06 | Paper |
| Simple refreshing in the noisy leakage model | 2020-05-11 | Paper |
| Multi-party virtual state channels | 2020-02-04 | Paper |
| Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version | 2019-11-27 | Paper |
| Unifying leakage models: from probing attacks to noisy leakage | 2019-01-29 | Paper |
| Amortizing randomness complexity in private circuits | 2018-04-06 | Paper |
| Consolidating inner product masking | 2018-04-06 | Paper |
| Position-based cryptography and multiparty communication complexity | 2018-01-19 | Paper |
| Non-malleable codes for space-bounded tampering | 2017-11-15 | Paper |
| Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model | 2017-06-13 | Paper |
| Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits | 2017-04-28 | Paper |
| Bounded tamper resilience: how to go beyond the algebraic barrier | 2017-03-02 | Paper |
| Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems | 2016-10-27 | Paper |
| Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate | 2016-07-15 | Paper |
| Signature schemes secure against hard-to-invert leakage | 2016-06-01 | Paper |
| Chosen-Ciphertext Security from Subset Sum | 2016-04-13 | Paper |
| Optimal Amplification of Noisy Leakages | 2016-04-08 | Paper |
| Efficient Leakage Resilient Circuit Compilers | 2016-03-02 | Paper |
| Proofs of Space | 2015-12-10 | Paper |
| Making Masking Security Proofs Concrete | 2015-09-30 | Paper |
| Noisy Leakage Revisited | 2015-09-30 | Paper |
| Inner Product Masking Revisited | 2015-09-30 | Paper |
| The Chaining Lemma and Its Application | 2015-09-24 | Paper |
| A Tamper and Leakage Resilient von Neumann Architecture | 2015-08-27 | Paper |
| Protecting Circuits from Computationally Bounded and Noisy Leakage | 2015-02-09 | Paper |
| On the Non-malleability of the Fiat-Shamir Transform | 2014-08-20 | Paper |
| Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits | 2014-05-27 | Paper |
| Unifying Leakage Models: From Probing Attacks to Noisy Leakage. | 2014-05-27 | Paper |
| Continuous Non-malleable Codes | 2014-02-18 | Paper |
| Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier | 2013-12-10 | Paper |
| Outsourced Pattern Matching | 2013-08-07 | Paper |
| Theory and Practice of a Leakage Resilient Masking Scheme | 2013-03-19 | Paper |
| Signature Schemes Secure against Hard-to-Invert Leakage | 2013-03-19 | Paper |
| Practical Leakage-Resilient Symmetric Cryptography | 2012-11-13 | Paper |
| Leakage-Resilient Circuits without Computational Assumptions | 2012-06-15 | Paper |
| Secure Two-Party Computation with Low Communication | 2012-06-15 | Paper |
| Leakage-Resilient Cryptography from the Inner-Product Extractor | 2011-12-02 | Paper |
| Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience | 2011-07-06 | Paper |
| Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases | 2010-06-01 | Paper |
| Leakage-Resilient Signatures | 2010-02-24 | Paper |
| Efficient Negative Databases from Cryptographic Hash Functions | 2008-06-24 | Paper |
| Efficient Simultaneous Broadcast | 2008-03-05 | Paper |