| Publication | Date of Publication | Type |
|---|
| Leakage-resilient hardness vs randomness | 2024-11-19 | Paper |
| Public-coin, complexity-preserving, succinct arguments of knowledge for NP from collision-resistance | 2024-11-13 | Paper |
| A direct PRF construction from Kolmogorov complexity | 2024-11-13 | Paper |
| Simplex consensus: a simple and fast consensus protocol | 2024-08-15 | Paper |
| Counting unpredictable bits: a simple PRG from one-way functions | 2024-08-01 | Paper |
| On one-way functions and sparse languages | 2024-08-01 | Paper |
| Characterizing derandomization through hardness of Levin-Kolmogorov complexity | 2024-07-05 | Paper |
| On one-way functions from NP-complete problems | 2024-07-05 | Paper |
| Bucket oblivious sort: an extremely simple oblivious sort | 2024-05-14 | Paper |
| One-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributions | 2024-02-02 | Paper |
| Indistinguishability obfuscation from circular security | 2023-11-14 | Paper |
| Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity | 2023-11-14 | Paper |
| Concurrently composable non-interactive secure computation | 2023-08-25 | Paper |
| Parallelizable delegation from LWE | 2023-08-14 | Paper |
| SPARKs: Succinct Parallelizable Arguments of Knowledge | 2023-04-27 | Paper |
| Non-malleable time-lock puzzles and applications | 2023-04-13 | Paper |
| One-Way Functions and (Im)perfect Obfuscation | 2023-04-04 | Paper |
| On the adaptive security of MACs and PRFs | 2023-03-21 | Paper |
| Communication complexity of Byzantine agreement, revisited | 2023-03-14 | Paper |
| Hybrid consensus: efficient consensus in the permissionless model | 2023-02-03 | Paper |
| Impossibility of strong KDM security with auxiliary input | 2022-12-16 | Paper |
| Unprovability of leakage-resilient cryptography beyond the information-theoretic limit | 2022-12-16 | Paper |
| On the complexity of compressing obfuscation | 2022-07-18 | Paper |
| Non-malleable codes for bounded parallel-time tampering | 2022-04-22 | Paper |
| On the possibility of basing cryptography on \(\mathsf{EXP}\ne \mathsf{BPP} \) | 2022-03-31 | Paper |
| Succinct non-interactive secure computation | 2022-03-23 | Paper |
| Locality-preserving oblivious RAM | 2022-03-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5018514 | 2021-12-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3384077 | 2021-12-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5015386 | 2021-12-07 | Paper |
| Continuous verifiable delay functions | 2021-12-01 | Paper |
| SPARKs: succinct parallelizable arguments of knowledge | 2021-12-01 | Paper |
| Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions? | 2021-12-01 | Paper |
| Sublinear-round Byzantine agreement under corrupt majority | 2021-12-01 | Paper |
| Minimizing trust in hardware wallets with two factor signatures | 2021-03-17 | Paper |
| Communication Complexity of Byzantine Agreement, Revisited | 2021-01-20 | Paper |
| Bayesian games with intentions | 2020-10-26 | Paper |
| Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles | 2020-08-25 | Paper |
| On the complexity of compressing obfuscation | 2020-06-30 | Paper |
| Synchronous, with a chance of partition tolerance | 2020-05-20 | Paper |
| Non-uniformly sound certificates with applications to concurrent zero-knowledge | 2020-03-09 | Paper |
| Locality-preserving oblivious RAM | 2020-02-06 | Paper |
| On the existence of Nash equilibrium in games with resource-bounded players | 2020-02-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5241068 | 2019-10-29 | Paper |
| The truth behind the myth of the folk theorem | 2019-09-19 | Paper |
| Socially Optimal Mining Pools | 2019-01-30 | Paper |
| Tight Revenue Bounds With Possibilistic Beliefs and Level-k Rationality | 2019-01-30 | Paper |
| On the security loss of unique signatures | 2018-12-11 | Paper |
| Game theoretic notions of fairness in multi-party coin toss | 2018-12-11 | Paper |
| Achieving fair treatment in algorithmic classification | 2018-12-11 | Paper |
| Game theory with translucent players | 2018-11-09 | Paper |
| Thunderella: blockchains with optimistic instant confirmation | 2018-07-09 | Paper |
| Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings | 2018-07-04 | Paper |
| The sleepy model of consensus | 2018-03-08 | Paper |
| Can we access a database both locally and privately? | 2018-01-19 | Paper |
| On the impossibility of cryptography with tamperable randomness | 2018-01-05 | Paper |
| FruitChains | 2017-10-11 | Paper |
| Reasoning about rationality | 2017-08-17 | Paper |
| Analysis of the Blockchain Protocol in Asynchronous Networks | 2017-06-13 | Paper |
| Formal Abstractions for Attested Execution Secure Processors | 2017-06-13 | Paper |
| The truth behind the myth of the folk theorem | 2017-05-19 | Paper |
| On the power of many one-bit provers | 2017-05-16 | Paper |
| Can theories be tested? | 2017-05-16 | Paper |
| On the power of nonuniformity in proofs of security | 2017-05-16 | Paper |
| Unprovable security of perfect NIZK and non-interactive non-malleable commitments | 2016-10-28 | Paper |
| Bounded KDM Security from iO and OWF | 2016-10-21 | Paper |
| Adaptive hardness and composable security in the plain model from standard assumptions | 2016-09-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5740446 | 2016-07-26 | Paper |
| Non-black-box simulation from one-way functions and applications to resettable security | 2016-04-25 | Paper |
| Indistinguishability Obfuscation with Non-trivial Efficiency | 2016-04-13 | Paper |
| Oblivious Parallel RAM and Applications | 2016-04-08 | Paper |
| Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings | 2016-03-23 | Paper |
| Lower Bounds on Assumptions Behind Indistinguishability Obfuscation | 2016-03-23 | Paper |
| Output-Compressing Randomized Encodings and Applications | 2016-03-23 | Paper |
| Limits of Extractability Assumptions with Distributional Auxiliary Input | 2016-03-23 | Paper |
| Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs | 2015-12-10 | Paper |
| Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation | 2015-12-10 | Paper |
| A Parallel Repetition Theorem for Constant-Round Arthur-Merlin Proofs | 2015-09-24 | Paper |
| Succinct Randomized Encodings and their Applications | 2015-08-21 | Paper |
| Constant-Round Nonmalleable Commitments from Any One-Way Function | 2015-08-14 | Paper |
| Outlier Privacy | 2015-07-06 | Paper |
| Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma | 2015-07-06 | Paper |
| Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence | 2015-07-06 | Paper |
| From Weak to Strong Zero-Knowledge and Applications | 2015-07-06 | Paper |
| Algorithmic rationality: game theory with costly computation | 2015-02-13 | Paper |
| Non-malleability amplification | 2015-02-04 | Paper |
| A unified framework for concurrent security | 2015-02-04 | Paper |
| On the Impossibility of Black-Box Transformations in Mechanism Design | 2015-01-14 | Paper |
| Not Just an Empty Threat: Subgame-Perfect Equilibrium in Repeated Games Played by Computationally Bounded Players | 2015-01-07 | Paper |
| Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead | 2015-01-06 | Paper |
| Local zero knowledge | 2014-11-25 | Paper |
| Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings | 2014-08-07 | Paper |
| Non-black-box simulation from one-way functions and applications to resettable security | 2014-08-07 | Paper |
| On the Impossibility of Cryptography with Tamperable Randomness | 2014-08-07 | Paper |
| The Randomness Complexity of Parallel Repetition | 2014-07-30 | Paper |
| Constant-round non-malleable commitments from any one-way function | 2014-06-05 | Paper |
| Limits of provable security from standard assumptions | 2014-06-05 | Paper |
| Concurrent zero knowledge, revisited | 2014-04-01 | Paper |
| Conservative belief and rationality | 2014-02-21 | Paper |
| 4-Round Resettably-Sound Zero Knowledge | 2014-02-18 | Paper |
| On Extractability Obfuscation | 2014-02-18 | Paper |
| Public-coin parallel zero-knowledge for NP | 2013-04-15 | Paper |
| A Unified Framework for UC from Only OT | 2013-03-19 | Paper |
| Randomness-Dependent Message Security | 2013-03-18 | Paper |
| Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments | 2013-03-18 | Paper |
| The Curious Case of Non-Interactive Commitments – On the Power of Black-Box vs. Non-Black-Box Use of Primitives | 2012-09-25 | Paper |
| Black-Box Constructions of Composable Protocols without Set-Up | 2012-09-25 | Paper |
| Crowd-Blending Privacy | 2012-09-25 | Paper |
| Multi-verifier signatures | 2012-07-03 | Paper |
| The Knowledge Tightness of Parallel Zero-Knowledge | 2012-06-15 | Paper |
| On the Composition of Public-Coin Zero-Knowledge Protocols | 2012-03-15 | Paper |
| Iterated regret minimization: a new solution concept | 2012-03-05 | Paper |
| Secure computation without authentication | 2012-01-13 | Paper |
| Concurrent Security and Non-malleability | 2011-05-19 | Paper |
| Towards Non-Black-Box Lower Bounds in Cryptography | 2011-05-19 | Paper |
| Towards Privacy for Social Networks: A Zero-Knowledge Based Definition of Privacy | 2011-05-19 | Paper |
| Concurrent Non-Malleable Zero Knowledge with Adaptive Inputs | 2011-05-19 | Paper |
| Concurrent Non-Malleable Zero Knowledge Proofs | 2010-08-24 | Paper |
| New and improved constructions of non-malleable cryptographic protocols | 2010-08-16 | Paper |
| Bounded-concurrent secure multi-party computation with a dishonest majority | 2010-08-15 | Paper |
| Constant-Round Non-malleable Commitments from Sub-exponential One-Way Functions | 2010-06-01 | Paper |
| Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model | 2010-02-24 | Paper |
| An Efficient Parallel Repetition Theorem | 2010-02-24 | Paper |
| Private Coins versus Public Coins in Zero-Knowledge Proof Systems | 2010-02-24 | Paper |
| On the Composition of Public-Coin Zero-Knowledge Protocols | 2009-10-20 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| New and Improved Constructions of Nonmalleable Cryptographic Protocols | 2009-04-30 | Paper |
| Black-Box Constructions of Two-Party Protocols from One-Way Functions | 2009-03-03 | Paper |
| Adaptive One-Way Functions and Applications | 2009-02-10 | Paper |
| Concurrent Nonmalleable Commitments | 2008-12-22 | Paper |
| Bounded CCA2-Secure Encryption | 2008-05-15 | Paper |
| Relations Among Notions of Non-malleability for Encryption | 2008-05-15 | Paper |
| Precise Concurrent Zero Knowledge | 2008-04-15 | Paper |
| Unconditional Characterizations of Non-interactive Zero-Knowledge | 2008-03-17 | Paper |
| Secure Computation Without Authentication | 2008-03-17 | Paper |
| Concurrent Non-malleable Commitments from Any One-Way Function | 2008-03-05 | Paper |
| On Constant-Round Concurrent Zero-Knowledge | 2008-03-05 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | 2007-09-04 | Paper |
| Universally Composable Security with Global Setup | 2007-08-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434874 | 2003-11-26 | Paper |