| Publication | Date of Publication | Type |
|---|
High-throughput secure three-party computation with an honest majority Journal of Cryptology | 2023-07-05 | Paper |
High-throughput secure three-party computation for malicious adversaries and an honest majority Lecture Notes in Computer Science | 2017-06-13 | Paper |
Short comparable encryption Cryptology and Network Security | 2015-02-10 | Paper |
Request-based comparable encryption Lecture Notes in Computer Science | 2014-10-16 | Paper |
2-pass key exchange protocols from CPA-secure KEM Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Controlled joining on encrypted relational database Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
An implementation of a universally verifiable electronic voting scheme based on shuffling Financial Cryptography | 2011-04-20 | Paper |
On the Minimum Communication Effort for Secure Group Key Exchange Selected Areas in Cryptography | 2011-03-15 | Paper |
An implementation of a mix-net based network voting scheme and its use in a private organization Towards Trustworthy Elections | 2010-06-17 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Efficient Identity-Based Encryption with Tight Security Reduction Cryptology and Network Security | 2009-01-09 | Paper |
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort Lecture Notes in Computer Science | 2008-11-20 | Paper |
An Efficient Publicly Verifiable Mix-Net for Long Inputs Financial Cryptography and Data Security | 2008-09-09 | Paper |
Universally Composable Undeniable Signature Automata, Languages and Programming | 2008-08-19 | Paper |
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
An Efficient Aggregate Shuffle Argument Scheme Financial Cryptography and Data Security | 2008-03-07 | Paper |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys Automata, Languages and Programming | 2007-11-28 | Paper |
Short Signature and Universal Designated Verifier Signature Without Random Oracles Applied Cryptography and Network Security | 2007-09-24 | Paper |
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge Automata, Languages and Programming | 2007-09-11 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
| k-Times Anonymous Authentication (Extended Abstract) | 2005-08-12 | Paper |
| scientific article; zbMATH DE number 1842502 (Why is no real title available?) | 2002-12-08 | Paper |