| Publication | Date of Publication | Type |
|---|
| Approximate lower bound arguments | 2024-11-13 | Paper |
In memory of Yuri Ilyich Lyubich Journal of Mathematical Physics, Analysis, Geometry | 2024-04-29 | Paper |
| Can a public blockchain keep a secret? | 2021-12-01 | Paper |
Computational fuzzy extractors Information and Computation | 2020-12-15 | Paper |
| Efficient noninteractive certification of RSA moduli and beyond | 2020-05-11 | Paper |
| Fuzzy password-authenticated key exchange | 2018-07-17 | Paper |
| Fiat-Shamir and correlation intractability from strong KDM-secure encryption | 2018-07-09 | Paper |
| A unified framework for trapdoor-permutation-based sequential aggregate signatures | 2018-05-29 | Paper |
| Beyond Hellman's time-memory trade-offs with applications to proofs of space | 2018-03-08 | Paper |
Scrypt is maximally memory-hard Lecture Notes in Computer Science | 2017-06-23 | Paper |
Reusable fuzzy extractors for low-entropy distributions Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
On the correlation intractability of obfuscated pseudorandom functions Theory of Cryptography | 2016-03-23 | Paper |
Privacy amplification with asymptotically optimal entropy loss Journal of the ACM | 2015-08-14 | Paper |
A unified approach to deterministic encryption: new constructions and a connection to computational entropy Journal of Cryptology | 2015-08-03 | Paper |
Protecting circuits from computationally bounded and noisy leakage SIAM Journal on Computing | 2015-02-09 | Paper |
Sequential aggregate signatures with lazy verification from trapdoor permutations Information and Computation | 2014-11-28 | Paper |
Privacy amplification with asymptotically optimal entropy loss Proceedings of the forty-second ACM symposium on Theory of computing | 2014-08-13 | Paper |
Amplifying Privacy in Privacy Amplification Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Computational fuzzy extractors Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology | 2013-06-27 | Paper |
Sequential aggregate signatures with lazy verification from trapdoor permutations. (Extended abstract) Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Theory of Cryptography | 2012-06-15 | Paper |
Some notions of entropy for cryptography. (Invited talk) Lecture Notes in Computer Science | 2011-05-19 | Paper |
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 Fast Software Encryption | 2009-08-11 | Paper |
Upper and lower bounds on black-box steganography Journal of Cryptology | 2009-06-30 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
Key Agreement from Close Secrets over Unsecured Channels Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
An Improved Robust Fuzzy Extractor Lecture Notes in Computer Science | 2008-11-20 | Paper |
Mercurial Commitments with Applications to Zero-Knowledge Sets Lecture Notes in Computer Science | 2008-05-06 | Paper |
Saving Private Randomness in One-Way Functions and Pseudorandom Generators Theory of Cryptography | 2008-03-05 | Paper |
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| scientific article; zbMATH DE number 1952889 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1952904 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1952891 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1950338 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1942440 (Why is no real title available?) | 2003-06-30 | Paper |
| scientific article; zbMATH DE number 1842510 (Why is no real title available?) | 2002-12-08 | Paper |
| scientific article; zbMATH DE number 1842500 (Why is no real title available?) | 2002-12-08 | Paper |
| scientific article; zbMATH DE number 1759791 (Why is no real title available?) | 2002-10-07 | Paper |
Improving the exact security of digital signature schemes Journal of Cryptology | 2002-05-21 | Paper |
| scientific article; zbMATH DE number 1489843 (Why is no real title available?) | 2002-05-14 | Paper |
| scientific article; zbMATH DE number 1722687 (Why is no real title available?) | 2002-03-21 | Paper |