| Publication | Date of Publication | Type |
|---|
| On the (in)security of the BUFF transform | 2024-12-04 | Paper |
| On fully-secure honest majority MPC without \(n^2\) round overhead | 2024-10-16 | Paper |
| Generalized special-sound interactive proofs and their knowledge soundness | 2024-08-02 | Paper |
| On the Quantum Security of HAWK | 2024-04-26 | Paper |
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Fiat-Shamir transformation of multi-round interactive proofs (Extended version) Journal of Cryptology | 2023-08-22 | Paper |
Fiat-Shamir transformation of multi-round interactive proofs Theory of Cryptography | 2023-08-14 | Paper |
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF Theory of Cryptography | 2023-08-14 | Paper |
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF Theory of Cryptography | 2023-08-14 | Paper |
Efficient NIZKs and signatures from commit-and-open protocols in the QROM Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Efficient NIZKs and signatures from commit-and-open protocols in the QROM Advances in Cryptology – CRYPTO 2022 | 2023-06-28 | Paper |
Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more (available as arXiv preprint) | 2022-12-07 | Paper |
Online-extractability in the quantum random-oracle model (available as arXiv preprint) | 2022-08-30 | Paper |
| Compressing proofs of \(k\)-out-of-\(n\) partial knowledge | 2022-05-18 | Paper |
| Robust secret sharing with almost optimal share size and security against rushing adversaries | 2022-03-23 | Paper |
| On the quantum complexity of the continuous hidden subgroup problem | 2022-03-23 | Paper |
On the compressed-oracle technique, and post-quantum security of proofs of sequential work (available as arXiv preprint) | 2021-12-08 | Paper |
| Sublinear bounds on the distinguishing advantage for multiple samples | 2021-02-23 | Paper |
A monogamy-of-entanglement game with applications to device-independent quantum cryptography New Journal of Physics | 2020-12-18 | Paper |
Security of the Fiat-Shamir transformation in the quantum random-oracle model (available as arXiv preprint) | 2020-03-09 | Paper |
| Towards optimal robust secret sharing with security against a rushing adversary | 2020-02-04 | Paper |
Secure certification of mixed quantum states with application to two-party randomness generation (available as arXiv preprint) | 2018-12-06 | Paper |
| Secure certification of mixed quantum states with application to two-party randomness generation | 2018-12-06 | Paper |
| Classical proofs for the quantum collapsing property of classical hash functions | 2018-12-06 | Paper |
Quantum authentication and encryption with key recycling. Or: how to re-use a one-time pad even if \(\mathsf{P}= \mathsf{NP}\) -- safely \& feasibly Lecture Notes in Computer Science | 2017-06-23 | Paper |
On the Conditional Rényi Entropy IEEE Transactions on Information Theory | 2017-05-16 | Paper |
The garden-hose model Proceedings of the 4th conference on Innovations in Theoretical Computer Science | 2017-05-16 | Paper |
On the parallel repetition of multi-player games: the no-signaling case (available as arXiv preprint) | 2017-03-13 | Paper |
Cheater detection in SPDZ multiparty computation Lecture Notes in Computer Science | 2017-01-06 | Paper |
Adaptive versus non-adaptive strategies in the quantum setting with applications Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Multi-prover commitments against non-signaling attacks Lecture Notes in Computer Science | 2015-12-10 | Paper |
An all-but-one entropic uncertainty relation, and application to password-based identification Theory of Quantum Computation, Communication, and Cryptography | 2015-12-03 | Paper |
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Secure identification and QKD in the bounded-quantum-storage model Theoretical Computer Science | 2014-12-02 | Paper |
Position-based quantum cryptography: impossibility and constructions SIAM Journal on Computing | 2014-06-04 | Paper |
On quantum Rényi entropies: a new generalization and some properties Journal of Mathematical Physics | 2014-04-28 | Paper |
Algebraic manipulation detection codes Science China. Mathematics | 2014-03-05 | Paper |
One-sided device-independent QKD and position-based cryptography from monogamy games Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Feasibility and completeness of cryptographic tasks in the quantum world Theory of Cryptography | 2013-03-18 | Paper |
Near-linear unconditionally-secure multiparty computation with a dishonest minority Lecture Notes in Computer Science | 2012-09-25 | Paper |
Unconditionally-secure robust secret sharing with compact shares Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Position-based quantum cryptography: impossibility and constructions Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Secure Authentication from a Weak Key, without Leaking Information Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Sampling in a quantum population, and applications Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Quantum cryptography Foundations of Physics | 2010-06-09 | Paper |
Encryption schemes secure against chosen-ciphertext selective opening attacks Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Improving the Security of Quantum Protocols via Commit-and-Open Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Secure Identification and QKD in the Bounded-Quantum-Storage Model Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Composing Quantum Protocols in a Classical Environment Theory of Cryptography | 2009-03-03 | Paper |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles Lecture Notes in Computer Science | 2009-02-10 | Paper |
Cryptography in the Bounded-Quantum-Storage Model SIAM Journal on Computing | 2008-12-22 | Paper |
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker Theory of Cryptography | 2008-03-05 | Paper |
Oblivious Transfer and Linear Functions Lecture Notes in Computer Science | 2007-09-04 | Paper |
Perfect NIZK with Adaptive Soundness Theory of Cryptography | 2007-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
| scientific article; zbMATH DE number 2009982 (Why is no real title available?) | 2003-11-26 | Paper |
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1942444 (Why is no real title available?) | 2003-06-30 | Paper |
| scientific article; zbMATH DE number 1942426 (Why is no real title available?) | 2003-06-30 | Paper |
| scientific article; zbMATH DE number 1842509 (Why is no real title available?) | 2002-12-08 | Paper |