Publication | Date of Publication | Type |
---|
Fixing and mechanizing the security proof of Fiat-Shamir with aborts and Dilithium | 2024-02-06 | Paper |
Fiat-Shamir transformation of multi-round interactive proofs (Extended version) | 2023-08-22 | Paper |
Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF | 2023-08-14 | Paper |
Fiat-Shamir transformation of multi-round interactive proofs | 2023-08-14 | Paper |
Efficient NIZKs and signatures from commit-and-open protocols in the QROM | 2023-06-28 | Paper |
Parallel repetition of \((k_1,\dots ,k_{\mu }) \)-special-sound multi-round interactive proofs | 2023-06-12 | Paper |
The measure-and-reprogram technique 2.0: multi-round Fiat-Shamir and more | 2022-12-07 | Paper |
Online-extractability in the quantum random-oracle model | 2022-08-30 | Paper |
Compressing proofs of \(k\)-out-of-\(n\) partial knowledge | 2022-05-18 | Paper |
On the quantum complexity of the continuous hidden subgroup problem | 2022-03-23 | Paper |
Robust secret sharing with almost optimal share size and security against rushing adversaries | 2022-03-23 | Paper |
On the compressed-oracle technique, and post-quantum security of proofs of sequential work | 2021-12-08 | Paper |
Sublinear bounds on the distinguishing advantage for multiple samples | 2021-02-23 | Paper |
A monogamy-of-entanglement game with applications to device-independent quantum cryptography | 2020-12-18 | Paper |
Security of the Fiat-Shamir transformation in the quantum random-oracle model | 2020-03-09 | Paper |
Towards optimal robust secret sharing with security against a rushing adversary | 2020-02-04 | Paper |
Secure certification of mixed quantum states with application to two-party randomness generation | 2018-12-06 | Paper |
Classical proofs for the quantum collapsing property of classical hash functions | 2018-12-06 | Paper |
Quantum Authentication and Encryption with Key Recycling | 2017-06-23 | Paper |
On the Conditional Rényi Entropy | 2017-05-16 | Paper |
The garden-hose model | 2017-05-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q2969044 | 2017-03-13 | Paper |
Cheater Detection in SPDZ Multiparty Computation | 2017-01-06 | Paper |
Adaptive Versus Non-Adaptive Strategies in the Quantum Setting with Applications | 2016-11-09 | Paper |
On the Composition of Two-Prover Commitments, and Applications to Multi-round Relativistic Commitments | 2016-07-15 | Paper |
Multi-prover Commitments Against Non-signaling Attacks | 2015-12-10 | Paper |
An All-But-One Entropic Uncertainty Relation, and Application to Password-Based Identification | 2015-12-03 | Paper |
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions | 2015-09-30 | Paper |
Secure identification and QKD in the bounded-quantum-storage model | 2014-12-02 | Paper |
Position-Based Quantum Cryptography: Impossibility and Constructions | 2014-06-04 | Paper |
On quantum Rényi entropies: A new generalization and some properties | 2014-04-28 | Paper |
Algebraic manipulation detection codes | 2014-03-05 | Paper |
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games | 2013-05-31 | Paper |
Feasibility and Completeness of Cryptographic Tasks in the Quantum World | 2013-03-18 | Paper |
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority | 2012-09-25 | Paper |
Unconditionally-Secure Robust Secret Sharing with Compact Shares | 2012-06-29 | Paper |
Position-Based Quantum Cryptography: Impossibility and Constructions | 2011-08-12 | Paper |
Secure Authentication from a Weak Key, without Leaking Information | 2011-05-27 | Paper |
Sampling in a Quantum Population, and Applications | 2010-08-24 | Paper |
Quantum cryptography | 2010-06-09 | Paper |
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks | 2010-06-01 | Paper |
Improving the Security of Quantum Protocols via Commit-and-Open | 2009-10-20 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
Secure Identification and QKD in the Bounded-Quantum-Storage Model | 2009-03-10 | Paper |
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications | 2009-03-10 | Paper |
Composing Quantum Protocols in a Classical Environment | 2009-03-03 | Paper |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles | 2009-02-10 | Paper |
Cryptography in the Bounded-Quantum-Storage Model | 2008-12-22 | Paper |
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors | 2008-04-15 | Paper |
Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields | 2008-03-17 | Paper |
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker | 2008-03-05 | Paper |
Oblivious Transfer and Linear Functions | 2007-09-04 | Paper |
Perfect NIZK with Adaptive Soundness | 2007-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434901 | 2003-11-26 | Paper |
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments | 2003-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409124 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409143 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4783743 | 2002-12-08 | Paper |