| Publication | Date of Publication | Type |
|---|
Encapsulated search index: public-key, sub-linear, distributed, and delegatable Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
| Time-space tradeoffs and short collisions in Merkle-Damgård hash functions | 2022-11-09 | Paper |
| Improved structured encryption for SQL databases via hybrid indexing | 2022-03-21 | Paper |
| A lower bound for one-round oblivious RAM | 2021-12-01 | Paper |
| Parameter-hiding order revealing encryption | 2018-12-20 | Paper |
| A ciphertext-size lower bound for order-preserving encryption with limited leakage | 2018-12-06 | Paper |
Efficient authentication from hard learning problems Journal of Cryptology | 2018-02-15 | Paper |
| Memory-tight reductions | 2017-11-03 | Paper |
Dynamic proofs of retrievability via oblivious RAM Journal of Cryptology | 2017-03-02 | Paper |
Targeted homomorphic attribute-based encryption Theory of Cryptography | 2016-12-22 | Paper |
Digital signatures from strong RSA without prime generation Lecture Notes in Computer Science | 2015-08-27 | Paper |
The locality of searchable symmetric encryption Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Dynamic proofs of retrievability via oblivious RAM Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Bonsai trees, or how to delegate a lattice basis Journal of Cryptology | 2013-01-04 | Paper |
Cryptography secure against related-key attacks and tampering Lecture Notes in Computer Science | 2011-12-02 | Paper |
Efficient Authentication from Hard Learning Problems Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Pseudorandom functions and permutations provably secure against related-key attacks Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Bonsai trees, or how to delegate a lattice basis Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Cryptographic agility and its relation to circular encryption Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Foundations of non-malleable hash and one-way functions Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
The twin Diffie-Hellman problem and applications Journal of Cryptology | 2009-11-13 | Paper |
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
The Twin Diffie-Hellman Problem and Applications Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model Theory of Cryptography | 2007-08-30 | Paper |
| scientific article; zbMATH DE number 2017944 (Why is no real title available?) | 2003-12-15 | Paper |