| Publication | Date of Publication | Type |
|---|
| Achievable \textsf{CCA2} relaxation for homomorphic encryption | 2024-12-27 | Paper |
| Weighted secret sharing from wiretap channels | 2024-11-22 | Paper |
| SPRINT: high-throughput robust distributed Schnorr signatures | 2024-11-13 | Paper |
| Security with functional re-encryption from CPA | 2024-08-02 | Paper |
| Additive randomized encodings and their applications | 2024-02-02 | Paper |
| Random-index oblivious RAM | 2023-08-14 | Paper |
| Achievable \textsf{CCA2} relaxation for homomorphic encryption | 2023-08-14 | Paper |
| Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation | 2023-04-13 | Paper |
| Random-index PIR and applications | 2023-04-13 | Paper |
| Homomorphic Encryption Standard | 2022-11-02 | Paper |
| Practical non-interactive publicly verifiable secret sharing with thousands of parties | 2022-08-30 | Paper |
| YOSO: You only speak once. Secure MPC with stateless ephemeral roles | 2022-04-22 | Paper |
| Homomorphic Encryption | 2022-01-12 | Paper |
| Can a public blockchain keep a secret? | 2021-12-01 | Paper |
| Round-optimal secure multi-party computation | 2021-07-30 | Paper |
| Bootstrapping for helib | 2021-04-07 | Paper |
| Homomorphic encryption for finite automata | 2020-05-05 | Paper |
| On fully secure MPC with solitary output | 2020-04-30 | Paper |
| Compressible FHE with applications to PIR | 2020-04-30 | Paper |
| An improved RNS variant of the BFV homomorphic encryption scheme | 2020-01-28 | Paper |
| Best possible information-theoretic MPC | 2018-12-06 | Paper |
| Round-optimal secure multi-party computation | 2018-09-26 | Paper |
| Faster homomorphic linear transformations in HElib | 2018-09-12 | Paper |
| MMH: Software message authentication in the Gbit/second rates | 2018-05-09 | Paper |
| Non-interactive multiparty computation without correlated randomness | 2018-02-23 | Paper |
| Four round secure computation without setup | 2018-01-19 | Paper |
| On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input | 2018-01-05 | Paper |
| Potential function analysis of greedy hot-potato routing | 2017-09-29 | Paper |
| Maintaining authenticated communication in the presence of break-ins | 2017-09-29 | Paper |
| Cryptanalyses of Candidate Branching Program Obfuscators | 2017-06-23 | Paper |
| Spooky Encryption and Its Applications | 2016-11-09 | Paper |
| Candidate indistinguishability obfuscation and functional encryption for all circuits | 2016-07-04 | Paper |
| Secure multiparty computation with general interaction patterns | 2016-04-15 | Paper |
| Functional Encryption Without Obfuscation | 2016-04-08 | Paper |
| Private Database Access with HE-over-ORAM Architecture | 2016-03-10 | Paper |
| Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | 2015-12-10 | Paper |
| Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing | 2015-11-11 | Paper |
| Bootstrapping for HElib | 2015-09-30 | Paper |
| Graph-Induced Multilinear Maps from Lattices | 2015-07-06 | Paper |
| Clock synchronization with faults and recoveries (extended abstract) | 2015-03-03 | Paper |
| Private approximation of NP-hard functions | 2015-02-27 | Paper |
| Optimizing ORAM and Using It Efficiently for Secure Computation | 2014-08-19 | Paper |
| Algorithms in HElib | 2014-08-07 | Paper |
| On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input | 2014-08-07 | Paper |
| Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits | 2014-07-30 | Paper |
| Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits | 2014-05-27 | Paper |
| Garbled RAM revisited | 2014-05-27 | Paper |
| Two-round secure MPC from indistinguishability obfuscation | 2014-02-18 | Paper |
| Private database queries using somewhat homomorphic encryption | 2014-01-24 | Paper |
| Discrete Gaussian leftover hash lemma over infinite domains | 2013-12-10 | Paper |
| Attribute-based encryption for circuits from multilinear maps | 2013-09-17 | Paper |
| Candidate Multilinear Maps from Ideal Lattices | 2013-05-31 | Paper |
| Packed ciphertexts in LWE-based homomorphic encryption | 2013-04-19 | Paper |
| Ring switching in BGV-style homomorphic encryption | 2012-09-25 | Paper |
| Homomorphic evaluation of the AES circuit | 2012-09-25 | Paper |
| Better bootstrapping in fully homomorphic encryption | 2012-07-20 | Paper |
| Fully homomorphic encryption with polylog overhead | 2012-06-29 | Paper |
| Leakage-Tolerant Interactive Protocols | 2012-06-15 | Paper |
| Smooth projective hashing and two-message oblivious transfer | 2012-05-23 | Paper |
| Program obfuscation with leaky hardware | 2011-12-02 | Paper |
| Collision-free hashing from lattice problems | 2011-08-19 | Paper |
| Secure computation on the web: computing without simultaneous interaction | 2011-08-12 | Paper |
| Implementing Gentry's fully-homomorphic encryption scheme | 2011-05-27 | Paper |
| After-the-fact leakage in public-key encryption | 2011-05-19 | Paper |
| One-pass HMQV and asymmetric key-wrapping | 2011-03-15 | Paper |
| The random oracle methodology, revisited. | 2011-02-01 | Paper |
| \(i\)-hop homomorphic encryption and rerandomizable Yao circuits | 2010-08-24 | Paper |
| Fully homomorphic encryption over the integers | 2010-06-01 | Paper |
| A simple BGN-type cryptosystem from LWE | 2010-06-01 | Paper |
| More on key wrapping | 2009-12-09 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Invertible Universal Hashing and the TET Encryption Mode | 2009-03-10 | Paper |
| Hierarchical Identity Based Encryption with Polynomially Many Levels | 2009-03-03 | Paper |
| Circular-Secure Encryption from Decision Diffie-Hellman | 2009-02-10 | Paper |
| Universally Composable Password-Based Key Exchange | 2008-05-06 | Paper |
| Cryptanalysis of ISO/IEC 9796-1 | 2008-04-16 | Paper |
| Threshold RSA for Dynamic and Ad-Hoc Groups | 2008-04-15 | Paper |
| On Seed-Incompressible Functions | 2008-03-05 | Paper |
| Degradation and Amplification of Computational Hardness | 2008-03-05 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Chosen‐Ciphertext Security from Identity‐Based Encryption | 2007-10-22 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Strengthening Digital Signatures Via Randomized Hashing | 2007-09-04 | Paper |
| Mitigating Dictionary Attacks on Password-Protected Local Storage | 2007-09-04 | Paper |
| A forward-secure public-key encryption scheme | 2007-08-20 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Exposure-resilient functions and all-or-nothing transforms | 2006-03-01 | Paper |
| Computing inverses over a shared secret modulus | 2006-03-01 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046355 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474164 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434880 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409140 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4785465 | 2003-02-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4542539 | 2002-09-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536797 | 2002-07-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941857 | 2000-07-26 | Paper |
| Efficient commitment schemes with bounded sender and unbounded receiver | 2000-05-22 | Paper |
| Maintaining authenticated communication in the presence of break-ins | 2000-05-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249337 | 1999-06-17 | Paper |
| Secure Hash-and-Sign Signatures Without the Random Oracle | 1999-01-01 | Paper |
| Potential function analysis of greedy hot-potato routing | 1998-08-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364546 | 1998-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364545 | 1998-01-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343425 | 1997-11-23 | Paper |