| Publication | Date of Publication | Type |
|---|
| Quantum Hoare logic with ghost variables | 2024-12-19 | Paper |
| Towards compressed permutation oracles | 2024-09-13 | Paper |
| How to base security on the perfect/statistical binding property of quantum bit commitment? | 2024-09-11 | Paper |
A thorough treatment of highly-efficient NTRU instantiations Lecture Notes in Computer Science | 2023-11-24 | Paper |
| Relationships between quantum IND-CPA notions | 2023-03-31 | Paper |
| Post-quantum verification of Fujisaki-Okamoto | 2023-03-21 | Paper |
Everlasting UC commitments from fully malicious PUFs Journal of Cryptology | 2022-07-15 | Paper |
| Generic authenticated key exchange in the quantum random oracle model | 2021-12-01 | Paper |
| Quantum security proofs using semi-classical oracles | 2020-03-09 | Paper |
Everlasting multi-party computation Journal of Cryptology | 2018-11-01 | Paper |
On the (im-)possibility of extending coin toss Journal of Cryptology | 2018-11-01 | Paper |
Revocable Quantum Timed-Release Encryption Journal of the ACM | 2018-08-02 | Paper |
| Post-quantum security of the sponge construction | 2018-06-22 | Paper |
| Post-quantum security of Fiat-Shamir | 2018-04-06 | Paper |
Security of blind signatures revisited Journal of Cryptology | 2017-05-22 | Paper |
Collapse-binding quantum commitments without random oracles Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms Theory of Cryptography | 2016-12-22 | Paper |
Computationally binding quantum commitments Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Quantum collision-resistance of non-uniformly distributed functions Post-Quantum Cryptography | 2016-04-26 | Paper |
Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation Post-Quantum Cryptography | 2016-04-26 | Paper |
Non-interactive zero-knowledge proofs in the quantum random oracle model Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Quantum position verification in the random oracle model Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Revocable quantum timed-release encryption Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
On using probabilistic Turing machines to model participants in cryptographic protocols Theoretical Computer Science | 2014-01-10 | Paper |
Quantum programs with classical output streams (extended abstract) Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
Everlasting multi-party computation Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Computational soundness of symbolic zero-knowledge proofs: weaker assumptions and mechanized verification Lecture Notes in Computer Science | 2013-08-06 | Paper |
Polynomial runtime and composability Journal of Cryptology | 2013-08-01 | Paper |
Security of blind signatures revisited Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Quantum proofs of knowledge Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Round optimal blind signatures Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Concurrent composition in the bounded quantum storage model Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Long-term security and universal composability Journal of Cryptology | 2010-11-12 | Paper |
Universally composable incoercibility Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Universally composable quantum multi-party computation Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Random Oracles and Auxiliary Input Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
OAEP Is Secure under Key-Dependent Messages Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Limits of Constructive Security Proofs Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
A Formal Language for Cryptographic Pseudocode Logic for Programming, Artificial Intelligence, and Reasoning | 2009-01-27 | Paper |
| scientific article; zbMATH DE number 5380260 (Why is no real title available?) | 2008-12-10 | Paper |
Towards Key-Dependent Message Security in the Standard Model Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
| Universally composable zero-knowledge arguments and commitments from signature cards | 2008-03-05 | Paper |
On the (Im-)Possibility of Extending Coin Toss Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Long-Term Security and Universal Composability Theory of Cryptography | 2007-08-30 | Paper |
On the Necessity of Rewinding in Secure Multiparty Computation Theory of Cryptography | 2007-08-30 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |