| Publication | Date of Publication | Type |
|---|
| On structure-preserving cryptography and lattices | 2024-11-12 | Paper |
| Compact selective opening security from LWE | 2024-11-12 | Paper |
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Journal of Cryptology | 2024-03-11 | Paper |
The power of undirected rewindings for adaptive security Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Deniable authentication when signing keys leak Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption Lecture Notes in Computer Science | 2023-11-16 | Paper |
Compact structure-preserving signatures with almost tight security Journal of Cryptology | 2023-08-22 | Paper |
The price of verifiability: lower bounds for verifiable random functions Theory of Cryptography | 2023-08-14 | Paper |
Onion routing with replies Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Towards tight adaptive security of non-interactive key exchange | 2023-04-13 | Paper |
| On the impossibility of purely algebraic signatures | 2023-04-13 | Paper |
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO Lecture Notes in Computer Science | 2022-10-13 | Paper |
| On instantiating the algebraic group model from falsifiable assumptions | 2022-03-23 | Paper |
Conditional reactive simulatability Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
Initiator-resilient universally composable key exchange Computer Security – ESORICS 2003 | 2022-02-16 | Paper |
| Adaptively secure constrained pseudorandom functions | 2021-03-17 | Paper |
Multilinear maps from obfuscation Journal of Cryptology | 2020-06-15 | Paper |
| Dual-mode NIZKs from obfuscation | 2020-05-20 | Paper |
| Designated-verifier pseudorandom generators, and their applications | 2020-02-06 | Paper |
| On tightly secure primitives in the multi-instance setting | 2020-01-28 | Paper |
| Identity-based encryption tightly secure under chosen-ciphertext attacks | 2019-01-23 | Paper |
On the (im-)possibility of extending coin toss Journal of Cryptology | 2018-11-01 | Paper |
| On tightly secure non-interactive key exchange | 2018-09-26 | Paper |
| More efficient (almost) tightly secure structure-preserving signatures | 2018-07-09 | Paper |
| Interactively secure groups from obfuscation | 2018-05-29 | Paper |
| Graded encoding schemes from obfuscation | 2018-05-29 | Paper |
| A modular analysis of the Fujisaki-Okamoto transformation | 2018-01-19 | Paper |
| Compact structure-preserving signatures with almost tight security | 2017-11-15 | Paper |
| Kurosawa-Desmedt meets tight security | 2017-10-27 | Paper |
Adaptive partitioning Lecture Notes in Computer Science | 2017-06-23 | Paper |
How to Generate and Use Universal Samplers Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Standard security does not imply indistinguishability under selective opening Theory of Cryptography | 2016-12-22 | Paper |
Public-key encryption with simulation-based selective-opening security and compact ciphertexts Theory of Cryptography | 2016-12-22 | Paper |
Tightly CCA-secure encryption without pairings Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Tightly secure signatures and public-key encryption Designs, Codes and Cryptography | 2016-06-27 | Paper |
Idealizing identity-based encryption Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Multilinear maps from obfuscation Theory of Cryptography | 2016-03-23 | Paper |
Algebraic partitioning: fully compact and (almost) tightly secure cryptography Theory of Cryptography | 2016-03-23 | Paper |
Verifiable random functions from standard assumptions Theory of Cryptography | 2016-03-23 | Paper |
Reconfigurable cryptography: a flexible approach to long-term security Theory of Cryptography | 2016-03-23 | Paper |
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting Lecture Notes in Computer Science | 2015-08-27 | Paper |
GNUC: a new universal composability framework Journal of Cryptology | 2015-08-03 | Paper |
Tightly-secure authenticated key exchange Theory of Cryptography | 2015-07-06 | Paper |
Confined guessing: new signatures from standard assumptions Journal of Cryptology | 2015-03-25 | Paper |
Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? Journal of Cryptology | 2015-03-25 | Paper |
Universally Composable Non-Interactive Key Exchange Lecture Notes in Computer Science | 2014-10-14 | Paper |
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
A generic view on trace-and-revoke broadcast encryption schemes Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Encryption schemes secure under related-key and key-dependent message attacks Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Standard versus selective opening security: separation and equivalence results Theory of Cryptography | 2014-02-18 | Paper |
Programmable hash functions in the multilinear setting Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Polynomial runtime and composability Journal of Cryptology | 2013-08-01 | Paper |
Circular chosen-ciphertext security with compact ciphertexts Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Practical signatures from standard assumptions Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Non-interactive key exchange Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Practical chosen ciphertext secure encryption from factoring Journal of Cryptology | 2013-04-15 | Paper |
Bonsai trees, or how to delegate a lattice basis Journal of Cryptology | 2013-01-04 | Paper |
Tightly Secure Signatures and Public-Key Encryption Lecture Notes in Computer Science | 2012-09-25 | Paper |
Possibility and impossibility results for selective decommitments Journal of Cryptology | 2012-09-21 | Paper |
On definitions of selective opening security Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Waters signatures with optimal security reduction Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Programmable hash functions and their applications Journal of Cryptology | 2012-07-10 | Paper |
All-but-many lossy trapdoor functions Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Short signatures from weaker assumptions Lecture Notes in Computer Science | 2011-12-02 | Paper |
Some (in)sufficient conditions for secure hybrid encryption Information and Computation | 2010-10-22 | Paper |
Bonsai trees, or how to delegate a lattice basis Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Encryption schemes secure against chosen-ciphertext selective opening attacks Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Bounded key-dependent message security Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Obfuscation for cryptographic purposes Journal of Cryptology | 2010-03-01 | Paper |
A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems Theory of Cryptography | 2010-02-24 | Paper |
The Group of Signed Quadratic Residues and Applications Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
Practical Chosen Ciphertext Secure Encryption from Factoring Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Secure Hybrid Encryption from Weakened Key Encapsulation Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Programmable Hash Functions and Their Applications Lecture Notes in Computer Science | 2009-02-10 | Paper |
| scientific article; zbMATH DE number 5380260 (Why is no real title available?) | 2008-12-10 | Paper |
| scientific article; zbMATH DE number 5380259 (Why is no real title available?) | 2008-12-10 | Paper |
Bounded CCA2-Secure Encryption Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Public-Key Encryption with Non-interactive Opening Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Towards Key-Dependent Message Security in the Standard Model Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
| Universally composable zero-knowledge arguments and commitments from signature cards | 2008-03-05 | Paper |
On the (Im-)Possibility of Extending Coin Toss Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Obfuscation for Cryptographic Purposes Theory of Cryptography | 2007-08-30 | Paper |
| On IND-CCA security modeling in cryptographic protocols | 2007-02-13 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
On the security of two public key cryptosystems using non-abelian groups Designs, Codes and Cryptography | 2004-08-16 | Paper |
A Practical Attack on Some Braid Group Based Cryptographic Primitives Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |