| Publication | Date of Publication | Type |
|---|
| On the (in)security of the BUFF transform | 2024-12-04 | Paper |
| On fully-secure honest majority MPC without \(n^2\) round overhead | 2024-10-16 | Paper |
| Generalized special-sound interactive proofs and their knowledge soundness | 2024-08-02 | Paper |
| On the Quantum Security of HAWK | 2024-04-26 | Paper |
| Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium | 2024-02-06 | Paper |
| Fiat-Shamir transformation of multi-round interactive proofs (Extended version) | 2023-08-22 | Paper |
| Fiat-Shamir transformation of multi-round interactive proofs | 2023-08-14 | Paper |
| Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF | 2023-08-14 | Paper |
| Efficient NIZKs and signatures from commit-and-open protocols in the QROM | 2023-06-28 | Paper |
| Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs | 2023-06-12 | Paper |
| The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more | 2022-12-07 | Paper |
| Online-extractability in the quantum random-oracle model | 2022-08-30 | Paper |
| Compressing proofs of \(k\)-out-of-\(n\) partial knowledge | 2022-05-18 | Paper |
| Robust secret sharing with almost optimal share size and security against rushing adversaries | 2022-03-23 | Paper |
| On the quantum complexity of the continuous hidden subgroup problem | 2022-03-23 | Paper |
| On the compressed-oracle technique, and post-quantum security of proofs of sequential work | 2021-12-08 | Paper |
| Sublinear bounds on the distinguishing advantage for multiple samples | 2021-02-23 | Paper |
| A monogamy-of-entanglement game with applications to device-independent quantum cryptography | 2020-12-18 | Paper |
| Security of the Fiat-Shamir transformation in the quantum random-oracle model | 2020-03-09 | Paper |
| Towards optimal robust secret sharing with security against a rushing adversary | 2020-02-04 | Paper |
| Secure certification of mixed quantum states with application to two-party randomness generation | 2018-12-06 | Paper |
| Classical proofs for the quantum collapsing property of classical hash functions | 2018-12-06 | Paper |
| Quantum authentication and encryption with key recycling. Or: how to re-use a one-time pad even if \(\mathsf{P}= \mathsf{NP}\) -- safely \& feasibly | 2017-06-23 | Paper |
| On the Conditional Rényi Entropy | 2017-05-16 | Paper |
| The garden-hose model | 2017-05-16 | Paper |
| On the parallel repetition of multi-player games: the no-signaling case | 2017-03-13 | Paper |
| Cheater detection in SPDZ multiparty computation | 2017-01-06 | Paper |
| Adaptive versus non-adaptive strategies in the quantum setting with applications | 2016-11-09 | Paper |
| On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments | 2016-07-15 | Paper |
| Multi-prover commitments against non-signaling attacks | 2015-12-10 | Paper |
| An all-but-one entropic uncertainty relation, and application to password-based identification | 2015-12-03 | Paper |
| Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions | 2015-09-30 | Paper |
| Secure identification and QKD in the bounded-quantum-storage model | 2014-12-02 | Paper |
| Position-based quantum cryptography: impossibility and constructions | 2014-06-04 | Paper |
| On quantum Rényi entropies: a new generalization and some properties | 2014-04-28 | Paper |
| Algebraic manipulation detection codes | 2014-03-05 | Paper |
| One-sided device-independent QKD and position-based cryptography from monogamy games | 2013-05-31 | Paper |
| Feasibility and completeness of cryptographic tasks in the quantum world | 2013-03-18 | Paper |
| Near-linear unconditionally-secure multiparty computation with a dishonest minority | 2012-09-25 | Paper |
| Unconditionally-secure robust secret sharing with compact shares | 2012-06-29 | Paper |
| Position-based quantum cryptography: impossibility and constructions | 2011-08-12 | Paper |
| Secure Authentication from a Weak Key, without Leaking Information | 2011-05-27 | Paper |
| Sampling in a quantum population, and applications | 2010-08-24 | Paper |
| Quantum cryptography | 2010-06-09 | Paper |
| Encryption schemes secure against chosen-ciphertext selective opening attacks | 2010-06-01 | Paper |
| Improving the Security of Quantum Protocols via Commit-and-Open | 2009-10-20 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| A Tight High-Order Entropic Quantum Uncertainty Relation with Applications | 2009-03-10 | Paper |
| Secure Identification and QKD in the Bounded-Quantum-Storage Model | 2009-03-10 | Paper |
| Composing Quantum Protocols in a Classical Environment | 2009-03-03 | Paper |
| On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles | 2009-02-10 | Paper |
| Cryptography in the Bounded-Quantum-Storage Model | 2008-12-22 | Paper |
| Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors | 2008-04-15 | Paper |
| Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields | 2008-03-17 | Paper |
| Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker | 2008-03-05 | Paper |
| Oblivious Transfer and Linear Functions | 2007-09-04 | Paper |
| Perfect NIZK with Adaptive Soundness | 2007-08-30 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434901 | 2003-11-26 | Paper |
| Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409143 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409124 | 2003-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4783743 | 2002-12-08 | Paper |