| Publication | Date of Publication | Type |
|---|
| Chosen-ciphertext secure dual-receiver encryption in the standard model based on post-quantum assumptions | 2024-11-12 | Paper |
| Practically efficient private set intersection from trusted hardware with side-channels | 2024-09-13 | Paper |
| Composable long-term security with rewinding | 2024-08-15 | Paper |
| On the correlation complexity of MPC with cheater identification | 2024-07-17 | Paper |
| Universally composable auditable surveillance | 2024-06-26 | Paper |
Sender-binding key encapsulation Lecture Notes in Computer Science | 2023-11-24 | Paper |
A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
\textit{ConTra corona}: contact tracing against the coronavirus by bridging the centralized-decentralized divide for stronger privacy Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Environmentally friendly composable multi-party computation in the plain model from standard (timed) assumptions | 2023-03-31 | Paper |
Initiator-resilient universally composable key exchange Computer Security – ESORICS 2003 | 2022-02-16 | Paper |
On the (im-)possibility of extending coin toss Journal of Cryptology | 2018-11-01 | Paper |
On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits" IEEE Transactions on Computers | 2018-07-09 | Paper |
| Non-malleability vs. CCA-security: the case of commitments | 2018-05-29 | Paper |
| Reusing tamper-proof hardware in UC-secure protocols | 2018-05-16 | Paper |
A CCA2 Secure Variant of the McEliece Cryptosystem IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Synchronous universally composable computer networks Cryptography and Information Security in the Balkans | 2016-04-26 | Paper |
Closing the gap: a universal privacy framework for outsourced data Cryptography and Information Security in the Balkans | 2016-04-26 | Paper |
From stateful hardware to resettable hardware using symmetric assumptions Provable Security | 2016-01-27 | Paper |
Weakening the isolation assumption of tamper-proof hardware tokens Lecture Notes in Computer Science | 2015-09-24 | Paper |
Universally composable firewall architectures using trusted hardware Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens Theory of Cryptography | 2015-07-06 | Paper |
Defining privacy based on distributions of privacy breaches Lecture Notes in Computer Science | 2013-12-10 | Paper |
Polynomial runtime and composability Journal of Cryptology | 2013-08-01 | Paper |
Lossy codes and a new variant of the learning-with-errors problem Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
IND-CCA secure cryptography based on a variant of the LPN problem Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Implementing resettable UC-functionalities with untrusted tamper-proof hardware-tokens Theory of Cryptography | 2013-03-18 | Paper |
Universally composable oblivious transfer from lossy encryption and the MceEliece assumptions Lecture Notes in Computer Science | 2012-11-06 | Paper |
Statistically secure linear-rate dimension extension for oblivious affine function evaluation Lecture Notes in Computer Science | 2012-11-06 | Paper |
Completeness theorems with constructive proofs for finite deterministic 2-party functions Theory of Cryptography | 2011-05-19 | Paper |
Unconditional and composable security using a single stateful Tamper-proof hardware token Theory of Cryptography | 2011-05-19 | Paper |
Efficient reductions for non-signaling cryptographic primitives Lecture Notes in Computer Science | 2011-05-19 | Paper |
Long-term security and universal composability Journal of Cryptology | 2010-11-12 | Paper |
Universally composable incoercibility Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations Lecture Notes in Computer Science | 2010-02-09 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2009-05-14 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security Theory of Cryptography | 2009-03-03 | Paper |
Oblivious Transfer Based on the McEliece Assumptions Lecture Notes in Computer Science | 2009-01-09 | Paper |
Cryptanalysis of a practical quantum key distribution with polarization-entangled photons (available as arXiv preprint) | 2008-09-03 | Paper |
| An information theoretical model for quantum secret sharing schemes | 2008-09-03 | Paper |
| scientific article; zbMATH DE number 5320218 (Why is no real title available?) | 2008-09-03 | Paper |
Fairness and Correctness in Case of a Premature Abort Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
| Universally composable zero-knowledge arguments and commitments from signature cards | 2008-03-05 | Paper |
Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm Journal of Symbolic Computation | 2007-10-23 | Paper |
On the (Im-)Possibility of Extending Coin Toss Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Long-Term Security and Universal Composability Theory of Cryptography | 2007-08-30 | Paper |
On the Necessity of Rewinding in Secure Multiparty Computation Theory of Cryptography | 2007-08-30 | Paper |
| On IND-CCA security modeling in cryptographic protocols | 2007-02-13 | Paper |
SOFSEM 2005: Theory and Practice of Computer Science Lecture Notes in Computer Science | 2005-12-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 1982619 (Why is no real title available?) | 2003-09-16 | Paper |
Gröbner bases applied to finitely generated field extensions Journal of Symbolic Computation | 2002-11-11 | Paper |
Recognizing simple subextensions of purely transcendental field extensions Applicable Algebra in Engineering, Communication and Computing | 2002-06-18 | Paper |
| Quantum identification protocol with technologically bounded parties | 2001-10-14 | Paper |
| scientific article; zbMATH DE number 1504682 (Why is no real title available?) | 2000-12-21 | Paper |
Separation of orbits under group actions with an application to quantum systems Applicable Algebra in Engineering, Communication and Computing | 2000-06-21 | Paper |
Basic algorithms for rational function fields Journal of Symbolic Computation | 2000-05-07 | Paper |
Freeness, linear disjointness, and implicitization -- a classical approach. Beiträge zur Algebra und Geometrie | 2000-05-02 | Paper |
Freeness, linear disjointness, and implicitization -- a classical approach. Beiträge zur Algebra und Geometrie | 2000-05-02 | Paper |
Decomposing a matrix into circulant and diagonal factors Linear Algebra and its Applications | 2000-03-22 | Paper |
| scientific article; zbMATH DE number 1262442 (Why is no real title available?) | 1999-08-17 | Paper |
| scientific article; zbMATH DE number 1163439 (Why is no real title available?) | 1999-05-31 | Paper |