| Publication | Date of Publication | Type |
|---|
| SoK: public key encryption with openings | 2024-11-12 | Paper |
| On evaluating anonymity of onion routing | 2024-10-14 | Paper |
| Dynamic security aspects of onion routing | 2024-08-30 | Paper |
| Multi-instance secure public-key encryption | 2023-11-16 | Paper |
| Vetted encryption | 2022-07-06 | Paper |
| Tightness subtleties for multi-user PKE notions | 2022-06-29 | Paper |
| XTR and Tori | 2022-02-25 | Paper |
| Introduction | 2022-02-25 | Paper |
| Assessing the feasibility of single trace power analysis of Frodo | 2019-02-20 | Paper |
| Untagging Tor: a formal treatment of onion encryption | 2018-07-17 | Paper |
| Authenticated encryption in the face of protocol and side channel leakage | 2018-04-06 | Paper |
| Multi-key authenticated encryption with corruptions: reductions are lossy | 2018-01-19 | Paper |
| The security of tandem-DM in the ideal cipher model | 2017-05-22 | Paper |
| Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations | 2017-02-01 | Paper |
| A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case | 2016-11-30 | Paper |
| Indifferentiability of Confusion-Diffusion Networks | 2016-07-15 | Paper |
| Counting Keys in Parallel After a Side Channel Attack | 2016-03-23 | Paper |
| Rogue Decryption Failures: Reconciling AE Robustness Notions | 2016-01-12 | Paper |
| A Leakage Resilient MAC | 2016-01-12 | Paper |
| MJH: a faster alternative to MDC-2 | 2015-09-29 | Paper |
| On Symmetric Encryption with Distinguishable Decryption Failures | 2015-09-18 | Paper |
| Simulatable Leakage: Analysis, Pitfalls, and New Constructions | 2015-01-16 | Paper |
| Discrete Logarithm Variants of VSH | 2014-08-21 | Paper |
| KDM Security in the Hybrid Framework | 2014-03-28 | Paper |
| Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions | 2013-05-31 | Paper |
| Understanding Adaptivity: Random Systems Revisited | 2013-03-19 | Paper |
| Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation | 2012-06-29 | Paper |
| Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry | 2012-06-15 | Paper |
| The Symbiosis between Collision and Preimage Resistance | 2011-12-16 | Paper |
| On the Joint Security of Encryption and Signature, Revisited | 2011-12-02 | Paper |
| The Preimage Security of Double-Block-Length Compression Functions | 2011-12-02 | Paper |
| Efficient Hashing Using the AES Instruction Set | 2011-10-07 | Paper |
| The Collision Security of Tandem-DM in the Ideal Cipher Model | 2011-08-12 | Paper |
| MJH: A Faster Alternative to MDC-2 | 2011-02-11 | Paper |
| Random Oracles with(out) Programmability | 2010-12-07 | Paper |
| Collision Attacks against the Knudsen-Preneel Compression Functions | 2010-12-07 | Paper |
| An analysis of the blockcipher-based hash functions from PGV | 2010-11-12 | Paper |
| Attacking the Knudsen-Preneel Compression Functions | 2010-07-13 | Paper |
| Confidential Signatures and Deterministic Signcryption | 2010-05-28 | Paper |
| Obfuscation for cryptographic purposes | 2010-03-01 | Paper |
| Another Glance at Double-Length Hashing | 2010-01-07 | Paper |
| Blockcipher-Based Hashing Revisited | 2009-08-11 | Paper |
| A New Randomness Extraction Paradigm for Hybrid Encryption | 2009-05-12 | Paper |
| Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions | 2009-02-10 | Paper |
| Building a Collision-Resistant Compression Function from Non-compressing Primitives | 2008-08-19 | Paper |
| Practical Cryptography in High Dimensional Tori | 2008-05-06 | Paper |
| Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields | 2008-03-17 | Paper |
| Obfuscation for Cryptographic Purposes | 2007-08-30 | Paper |
| On Small Characteristic Algebraic Tori in Pairing-Based Cryptography | 2007-04-04 | Paper |
| Cryptography and Coding | 2006-11-01 | Paper |
| Cryptography and Coding | 2006-11-01 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| List signature schemes | 2006-04-28 | Paper |
| Algorithmic Number Theory | 2005-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474169 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4425716 | 2003-09-11 | Paper |
| On Montgomery-Like Representations for Elliptic Curves over GF(2k) | 2003-07-27 | Paper |