| Publication | Date of Publication | Type |
|---|
| On the (in)security of the BUFF transform | 2024-12-04 | Paper |
| On fully-secure honest majority MPC without \(n^2\) round overhead | 2024-10-16 | Paper |
| Generalized special-sound interactive proofs and their knowledge soundness | 2024-08-02 | Paper |
| On the Quantum Security of HAWK | 2024-04-26 | Paper |
| Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium | 2024-02-06 | Paper |
| Fiat-Shamir transformation of multi-round interactive proofs (Extended version) | 2023-08-22 | Paper |
| Fiat-Shamir transformation of multi-round interactive proofs | 2023-08-14 | Paper |
| Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF | 2023-08-14 | Paper |
| Efficient NIZKs and signatures from commit-and-open protocols in the QROM | 2023-06-28 | Paper |
| Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs | 2023-06-12 | Paper |
| The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more | 2022-12-07 | Paper |
| Online-extractability in the quantum random-oracle model | 2022-08-30 | Paper |
| Compressing proofs of \(k\)-out-of-\(n\) partial knowledge | 2022-05-18 | Paper |
| Robust secret sharing with almost optimal share size and security against rushing adversaries | 2022-03-23 | Paper |
| On the quantum complexity of the continuous hidden subgroup problem | 2022-03-23 | Paper |
| On the compressed-oracle technique, and post-quantum security of proofs of sequential work | 2021-12-08 | Paper |
| Sublinear bounds on the distinguishing advantage for multiple samples | 2021-02-23 | Paper |
| A monogamy-of-entanglement game with applications to device-independent quantum cryptography | 2020-12-18 | Paper |
| Security of the Fiat-Shamir transformation in the quantum random-oracle model | 2020-03-09 | Paper |
| Towards optimal robust secret sharing with security against a rushing adversary | 2020-02-04 | Paper |
| Secure certification of mixed quantum states with application to two-party randomness generation | 2018-12-06 | Paper |
| Classical proofs for the quantum collapsing property of classical hash functions | 2018-12-06 | Paper |
| Quantum Authentication and Encryption with Key Recycling | 2017-06-23 | Paper |
| On the Conditional Rényi Entropy | 2017-05-16 | Paper |
| The garden-hose model | 2017-05-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2969044 | 2017-03-13 | Paper |
| Cheater Detection in SPDZ Multiparty Computation | 2017-01-06 | Paper |
| Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications | 2016-11-09 | Paper |
| On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments | 2016-07-15 | Paper |
| Multi-prover Commitments Against Non-signaling Attacks | 2015-12-10 | Paper |
| An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification | 2015-12-03 | Paper |
| Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions | 2015-09-30 | Paper |
| Secure identification and QKD in the bounded-quantum-storage model | 2014-12-02 | Paper |
| Position-Based Quantum Cryptography: Impossibility and Constructions | 2014-06-04 | Paper |
| On quantum Rényi entropies: A new generalization and some properties | 2014-04-28 | Paper |
| Algebraic manipulation detection codes | 2014-03-05 | Paper |
| One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games | 2013-05-31 | Paper |
| Feasibility and Completeness of Cryptographic Tasks in the Quantum World | 2013-03-18 | Paper |
| Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority | 2012-09-25 | Paper |
| Unconditionally-Secure Robust Secret Sharing with Compact Shares | 2012-06-29 | Paper |
| Position-Based Quantum Cryptography: Impossibility and Constructions | 2011-08-12 | Paper |
| Secure Authentication from a Weak Key, without Leaking Information | 2011-05-27 | Paper |
| Sampling in a Quantum Population, and Applications | 2010-08-24 | Paper |
| Quantum cryptography | 2010-06-09 | Paper |
| Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks | 2010-06-01 | Paper |
| Improving the Security of Quantum Protocols via Commit-and-Open | 2009-10-20 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| A Tight High-Order Entropic Quantum Uncertainty Relation with Applications | 2009-03-10 | Paper |
| Secure Identification and QKD in the Bounded-Quantum-Storage Model | 2009-03-10 | Paper |
| Composing Quantum Protocols in a Classical Environment | 2009-03-03 | Paper |
| On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles | 2009-02-10 | Paper |
| Cryptography in the Bounded-Quantum-Storage Model | 2008-12-22 | Paper |
| Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors | 2008-04-15 | Paper |
| Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields | 2008-03-17 | Paper |
| Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker | 2008-03-05 | Paper |
| Oblivious Transfer and Linear Functions | 2007-09-04 | Paper |
| Perfect NIZK with Adaptive Soundness | 2007-08-30 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434901 | 2003-11-26 | Paper |
| Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409143 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409124 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783743 | 2002-12-08 | Paper |