| Publication | Date of Publication | Type |
|---|
| Chosen-ciphertext secure dual-receiver encryption in the standard model based on post-quantum assumptions | 2024-11-12 | Paper |
| Practically efficient private set intersection from trusted hardware with side-channels | 2024-09-13 | Paper |
| Composable long-term security with rewinding | 2024-08-15 | Paper |
| On the correlation complexity of MPC with cheater identification | 2024-07-17 | Paper |
| Universally composable auditable surveillance | 2024-06-26 | Paper |
| Sender-binding key encapsulation | 2023-11-24 | Paper |
| A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels | 2023-08-10 | Paper |
| \textit{ConTra corona}: contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy | 2023-05-12 | Paper |
| Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions | 2023-03-31 | Paper |
| Initiator-resilient universally composable key exchange | 2022-02-16 | Paper |
| On the (im-)possibility of extending coin toss | 2018-11-01 | Paper |
| On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits" | 2018-07-09 | Paper |
| Non-malleability vs. CCA-security: the case of commitments | 2018-05-29 | Paper |
| Reusing tamper-proof hardware in UC-secure protocols | 2018-05-16 | Paper |
| A CCA2 Secure Variant of the McEliece Cryptosystem | 2017-06-08 | Paper |
| Synchronous universally composable computer networks | 2016-04-26 | Paper |
| Closing the gap: a universal privacy framework for outsourced data | 2016-04-26 | Paper |
| From stateful hardware to resettable hardware using symmetric assumptions | 2016-01-27 | Paper |
| Weakening the isolation assumption of tamper-proof hardware tokens | 2015-09-24 | Paper |
| Universally composable firewall architectures using trusted hardware | 2015-09-21 | Paper |
| General Statistically Secure Computation with Bounded-Resettable Hardware Tokens | 2015-07-06 | Paper |
| Defining privacy based on distributions of privacy breaches | 2013-12-10 | Paper |
| Polynomial runtime and composability | 2013-08-01 | Paper |
| Lossy codes and a new variant of the learning-with-errors problem | 2013-05-31 | Paper |
| IND-CCA secure cryptography based on a variant of the LPN problem | 2013-03-19 | Paper |
| Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens | 2013-03-18 | Paper |
| Universally composable oblivious transfer from lossy encryption and the MceEliece assumptions | 2012-11-06 | Paper |
| Statistically secure linear-rate dimension extension for oblivious affine function evaluation | 2012-11-06 | Paper |
| Completeness theorems with constructive proofs for finite deterministic 2-party functions | 2011-05-19 | Paper |
| Unconditional and composable security using a single stateful Tamper-proof hardware token | 2011-05-19 | Paper |
| Efficient reductions for non-signaling cryptographic primitives | 2011-05-19 | Paper |
| Long-term security and universal composability | 2010-11-12 | Paper |
| Universally composable incoercibility | 2010-08-24 | Paper |
| Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations | 2010-02-09 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model | 2009-04-29 | Paper |
| Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security | 2009-03-03 | Paper |
| Oblivious Transfer Based on the McEliece Assumptions | 2009-01-09 | Paper |
| Cryptanalysis of a practical quantum key distribution with polarization-entangled photons | 2008-09-03 | Paper |
| An information theoretical model for quantum secret sharing schemes | 2008-09-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3522416 | 2008-09-03 | Paper |
| Fairness and Correctness in Case of a Premature Abort | 2008-03-17 | Paper |
| Universally composable zero-knowledge arguments and commitments from signature cards | 2008-03-05 | Paper |
| Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm | 2007-10-23 | Paper |
| On the (Im-)Possibility of Extending Coin Toss | 2007-09-24 | Paper |
| Long-Term Security and Universal Composability | 2007-08-30 | Paper |
| On the Necessity of Rewinding in Secure Multiparty Computation | 2007-08-30 | Paper |
| On IND-CCA security modeling in cryptographic protocols | 2007-02-13 | Paper |
| SOFSEM 2005: Theory and Practice of Computer Science | 2005-12-07 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4426688 | 2003-09-16 | Paper |
| Gröbner bases applied to finitely generated field extensions | 2002-11-11 | Paper |
| Recognizing simple subextensions of purely transcendental field extensions | 2002-06-18 | Paper |
| Quantum identification protocol with technologically bounded parties | 2001-10-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502646 | 2000-12-21 | Paper |
| Separation of orbits under group actions with an application to quantum systems | 2000-06-21 | Paper |
| Basic algorithms for rational function fields | 2000-05-07 | Paper |
| Freeness, linear disjointness, and implicitization -- a classical approach. | 2000-05-02 | Paper |
| Decomposing a matrix into circulant and diagonal factors | 2000-03-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4232490 | 1999-08-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4394974 | 1999-05-31 | Paper |