| Publication | Date of Publication | Type |
|---|
| Approximate lower bound arguments | 2024-11-13 | Paper |
| In memory of Yuri Ilyich Lyubich | 2024-04-29 | Paper |
| Can a public blockchain keep a secret? | 2021-12-01 | Paper |
| Computational fuzzy extractors | 2020-12-15 | Paper |
| Efficient noninteractive certification of RSA moduli and beyond | 2020-05-11 | Paper |
| Fuzzy password-authenticated key exchange | 2018-07-17 | Paper |
| Fiat-Shamir and correlation intractability from strong KDM-secure encryption | 2018-07-09 | Paper |
| A unified framework for trapdoor-permutation-based sequential aggregate signatures | 2018-05-29 | Paper |
| Beyond Hellman's time-memory trade-offs with applications to proofs of space | 2018-03-08 | Paper |
| Scrypt Is Maximally Memory-Hard | 2017-06-23 | Paper |
| Reusable Fuzzy Extractors for Low-Entropy Distributions | 2016-09-09 | Paper |
| On the Correlation Intractability of Obfuscated Pseudorandom Functions | 2016-03-23 | Paper |
| Privacy amplification with asymptotically optimal entropy loss | 2015-08-14 | Paper |
| A unified approach to deterministic encryption: new constructions and a connection to computational entropy | 2015-08-03 | Paper |
| Protecting Circuits from Computationally Bounded and Noisy Leakage | 2015-02-09 | Paper |
| Sequential aggregate signatures with lazy verification from trapdoor permutations | 2014-11-28 | Paper |
| Privacy amplification with asymptotically optimal entropy loss | 2014-08-13 | Paper |
| Amplifying Privacy in Privacy Amplification | 2014-08-07 | Paper |
| Computational Fuzzy Extractors | 2013-12-10 | Paper |
| Mercurial commitments with applications to zero-knowledge sets | 2013-06-27 | Paper |
| Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations | 2013-03-19 | Paper |
| A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy | 2012-06-15 | Paper |
| Some Notions of Entropy for Cryptography | 2011-05-19 | Paper |
| Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases | 2010-06-01 | Paper |
| Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 | 2009-08-11 | Paper |
| Upper and lower bounds on black-box steganography | 2009-06-30 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Key Agreement from Close Secrets over Unsecured Channels | 2009-05-12 | Paper |
| An Improved Robust Fuzzy Extractor | 2008-11-20 | Paper |
| Mercurial Commitments with Applications to Zero-Knowledge Sets | 2008-05-06 | Paper |
| Saving Private Randomness in One-Way Functions and Pseudorandom Generators | 2008-03-05 | Paper |
| Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility | 2007-11-29 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414268 | 2003-07-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414286 | 2003-07-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414270 | 2003-07-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412971 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409139 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783744 | 2002-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783734 | 2002-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536814 | 2002-10-07 | Paper |
| Improving the exact security of digital signature schemes | 2002-05-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4496063 | 2002-05-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778858 | 2002-03-21 | Paper |