| Publication | Date of Publication | Type |
|---|
| On structure-preserving cryptography and lattices | 2024-11-12 | Paper |
| Compact selective opening security from LWE | 2024-11-12 | Paper |
| Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting | 2024-03-11 | Paper |
| The power of undirected rewindings for adaptive security | 2024-02-02 | Paper |
| Deniable authentication when signing keys leak | 2023-12-12 | Paper |
| Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption | 2023-11-16 | Paper |
| Compact structure-preserving signatures with almost tight security | 2023-08-22 | Paper |
| The price of verifiability: lower bounds for verifiable random functions | 2023-08-14 | Paper |
| Onion routing with replies | 2023-05-12 | Paper |
| Towards tight adaptive security of non-interactive key exchange | 2023-04-13 | Paper |
| On the impossibility of purely algebraic signatures | 2023-04-13 | Paper |
| The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO | 2022-10-13 | Paper |
| On instantiating the algebraic group model from falsifiable assumptions | 2022-03-23 | Paper |
| Conditional reactive simulatability | 2022-03-09 | Paper |
| Initiator-resilient universally composable key exchange | 2022-02-16 | Paper |
| Adaptively secure constrained pseudorandom functions | 2021-03-17 | Paper |
| Multilinear maps from obfuscation | 2020-06-15 | Paper |
| Dual-mode NIZKs from obfuscation | 2020-05-20 | Paper |
| Designated-verifier pseudorandom generators, and their applications | 2020-02-06 | Paper |
| On tightly secure primitives in the multi-instance setting | 2020-01-28 | Paper |
| Identity-based encryption tightly secure under chosen-ciphertext attacks | 2019-01-23 | Paper |
| On the (im-)possibility of extending coin toss | 2018-11-01 | Paper |
| On tightly secure non-interactive key exchange | 2018-09-26 | Paper |
| More efficient (almost) tightly secure structure-preserving signatures | 2018-07-09 | Paper |
| Interactively secure groups from obfuscation | 2018-05-29 | Paper |
| Graded encoding schemes from obfuscation | 2018-05-29 | Paper |
| A modular analysis of the Fujisaki-Okamoto transformation | 2018-01-19 | Paper |
| Compact structure-preserving signatures with almost tight security | 2017-11-15 | Paper |
| Kurosawa-Desmedt meets tight security | 2017-10-27 | Paper |
| Adaptive partitioning | 2017-06-23 | Paper |
| How to Generate and Use Universal Samplers | 2017-01-06 | Paper |
| Standard security does not imply indistinguishability under selective opening | 2016-12-22 | Paper |
| Public-key encryption with simulation-based selective-opening security and compact ciphertexts | 2016-12-22 | Paper |
| Tightly CCA-secure encryption without pairings | 2016-09-09 | Paper |
| Tightly secure signatures and public-key encryption | 2016-06-27 | Paper |
| Idealizing identity-based encryption | 2016-06-10 | Paper |
| Multilinear maps from obfuscation | 2016-03-23 | Paper |
| Algebraic partitioning: fully compact and (almost) tightly secure cryptography | 2016-03-23 | Paper |
| Verifiable random functions from standard assumptions | 2016-03-23 | Paper |
| Reconfigurable cryptography: a flexible approach to long-term security | 2016-03-23 | Paper |
| Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting | 2015-08-27 | Paper |
| GNUC: a new universal composability framework | 2015-08-03 | Paper |
| Tightly-secure authenticated key exchange | 2015-07-06 | Paper |
| Confined guessing: new signatures from standard assumptions | 2015-03-25 | Paper |
| Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? | 2015-03-25 | Paper |
| Universally Composable Non-Interactive Key Exchange | 2014-10-14 | Paper |
| Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations | 2014-08-07 | Paper |
| A generic view on trace-and-revoke broadcast encryption schemes | 2014-03-28 | Paper |
| Encryption schemes secure under related-key and key-dependent message attacks | 2014-03-25 | Paper |
| Standard versus selective opening security: separation and equivalence results | 2014-02-18 | Paper |
| Programmable hash functions in the multilinear setting | 2013-09-02 | Paper |
| Polynomial runtime and composability | 2013-08-01 | Paper |
| Circular chosen-ciphertext security with compact ciphertexts | 2013-05-31 | Paper |
| Practical signatures from standard assumptions | 2013-05-31 | Paper |
| Non-interactive key exchange | 2013-04-19 | Paper |
| Practical chosen ciphertext secure encryption from factoring | 2013-04-15 | Paper |
| Bonsai trees, or how to delegate a lattice basis | 2013-01-04 | Paper |
| Tightly Secure Signatures and Public-Key Encryption | 2012-09-25 | Paper |
| Possibility and impossibility results for selective decommitments | 2012-09-21 | Paper |
| On definitions of selective opening security | 2012-07-20 | Paper |
| Waters signatures with optimal security reduction | 2012-07-20 | Paper |
| Programmable hash functions and their applications | 2012-07-10 | Paper |
| All-but-many lossy trapdoor functions | 2012-06-29 | Paper |
| Short signatures from weaker assumptions | 2011-12-02 | Paper |
| Some (in)sufficient conditions for secure hybrid encryption | 2010-10-22 | Paper |
| Bonsai trees, or how to delegate a lattice basis | 2010-06-01 | Paper |
| Encryption schemes secure against chosen-ciphertext selective opening attacks | 2010-06-01 | Paper |
| Bounded key-dependent message security | 2010-06-01 | Paper |
| Obfuscation for cryptographic purposes | 2010-03-01 | Paper |
| A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems | 2010-02-24 | Paper |
| The Group of Signed Quadratic Residues and Applications | 2009-10-20 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Practical Chosen Ciphertext Secure Encryption from Factoring | 2009-05-12 | Paper |
| Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening | 2009-05-12 | Paper |
| Secure Hybrid Encryption from Weakened Key Encapsulation | 2009-03-10 | Paper |
| Programmable Hash Functions and Their Applications | 2009-02-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3545325 | 2008-12-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3545324 | 2008-12-10 | Paper |
| Bounded CCA2-Secure Encryption | 2008-05-15 | Paper |
| Public-Key Encryption with Non-interactive Opening | 2008-04-24 | Paper |
| Towards Key-Dependent Message Security in the Standard Model | 2008-04-15 | Paper |
| Universally composable zero-knowledge arguments and commitments from signature cards | 2008-03-05 | Paper |
| On the (Im-)Possibility of Extending Coin Toss | 2007-09-24 | Paper |
| Obfuscation for Cryptographic Purposes | 2007-08-30 | Paper |
| On IND-CCA security modeling in cryptographic protocols | 2007-02-13 | Paper |
| Information Security | 2006-10-20 | Paper |
| Information Security | 2006-10-16 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| On the security of two public key cryptosystems using non-abelian groups | 2004-08-16 | Paper |
| A Practical Attack on Some Braid Group Based Cryptographic Primitives | 2003-07-27 | Paper |