| Publication | Date of Publication | Type |
|---|
| On optimal tightness for key exchange with full forward secrecy via key confirmation | 2024-02-06 | Paper |
| Security analysis of the WhatsApp end-to-end encrypted backup protocol | 2024-02-06 | Paper |
| Simple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitments | 2023-11-24 | Paper |
| Subversion-resilient authenticated encryption without random oracles | 2023-11-10 | Paper |
| Symmetric Key Exchange with Full Forward Security and Robust Synchronization | 2023-05-26 | Paper |
| Digital Signatures with Memory-Tight Security in the Multi-challenge Setting | 2023-05-26 | Paper |
| Practical Invalid Curve Attacks on TLS-ECDH | 2022-08-19 | Paper |
| On fingerprinting attacks and length-hiding encryption | 2022-07-06 | Paper |
| Simple Security Definitions for and Constructions of 0-RTT Key Exchange | 2022-07-01 | Paper |
| Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract) | 2022-06-24 | Paper |
| Authenticated key exchange and signatures with tight security in the standard model | 2022-05-18 | Paper |
| More efficient digital signatures with tight multi-user security | 2021-12-21 | Paper |
| Subversion-resilient public key encryption with practical watchdogs | 2021-12-21 | Paper |
| Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance | 2021-12-21 | Paper |
| Tightly-secure authenticated key exchange, revisited | 2021-12-08 | Paper |
| On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments | 2021-08-10 | Paper |
| Session resumption protocols and efficient forward security for TLS 1.3 0-RTT | 2021-07-30 | Paper |
| Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange | 2021-06-28 | Paper |
| Offline witness encryption with semi-adaptive security | 2021-02-23 | Paper |
| On the real-world instantiability of admissible hash functions and efficient verifiable random functions | 2020-07-21 | Paper |
| Highly efficient key exchange protocols with optimal tightness | 2020-03-09 | Paper |
| Session resumption protocols and efficient forward security for TLS 1.3 0-RTT | 2020-02-06 | Paper |
| On tight security proofs for Schnorr signatures | 2019-06-20 | Paper |
| Short digital signatures and ID-KEMs via truncation collision resistance | 2019-01-23 | Paper |
| Simple and more efficient PRFs with tight security from LWE and matrix-DDH | 2019-01-23 | Paper |
| How to build time-lock encryption | 2018-10-10 | Paper |
| Practical and tightly-secure digital signatures and authenticated key exchange | 2018-09-26 | Paper |
| Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange | 2018-07-17 | Paper |
| Authenticated confidential channel establishment and the security of TLS-DHE | 2018-02-15 | Paper |
| Multi-key authenticated encryption with corruptions: reductions are lossy | 2018-01-19 | Paper |
| How to Generate and Use Universal Samplers | 2017-01-06 | Paper |
| Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts | 2016-12-22 | Paper |
| On the Impossibility of Tight Cryptographic Reductions | 2016-07-15 | Paper |
| Tightly secure signatures and public-key encryption | 2016-06-27 | Paper |
| Verifiable Random Functions from Standard Assumptions | 2016-03-23 | Paper |
| On the Selective Opening Security of Practical Public-Key Encryption Schemes | 2015-08-27 | Paper |
| One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model | 2015-08-27 | Paper |
| Tightly-Secure Authenticated Key Exchange | 2015-07-06 | Paper |
| Verifiable Random Functions from Weaker Assumptions | 2015-07-06 | Paper |
| Confined guessing: new signatures from standard assumptions | 2015-03-25 | Paper |
| On Tight Security Proofs for Schnorr Signatures | 2015-01-16 | Paper |
| On the analysis of cryptographic assumptions in the generic ring model | 2013-06-27 | Paper |
| Practical Signatures from Standard Assumptions | 2013-05-31 | Paper |
| Tightly Secure Signatures and Public-Key Encryption | 2012-09-25 | Paper |
| On the Security of TLS-DHE in the Standard Model | 2012-09-25 | Paper |
| Waters Signatures with Optimal Security Reduction | 2012-07-20 | Paper |
| Black-Box Models of Computation in Cryptology | 2012-07-10 | Paper |
| Short Signatures from Weaker Assumptions | 2011-12-02 | Paper |
| The Semi-Generic Group Model and Applications to Pairing-Based Cryptography | 2010-12-07 | Paper |
| Generic Compilers for Authenticated Key Exchange | 2010-12-07 | Paper |
| Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model | 2010-05-28 | Paper |
| On the analysis of cryptographic assumptions in the generic ring model | 2009-12-15 | Paper |
| On the Equivalence of Generic Group Models | 2009-01-27 | Paper |
| On Black-Box Ring Extraction and Integer Factorization | 2008-08-19 | Paper |