Publication | Date of Publication | Type |
---|
Additive randomized encodings and their applications | 2024-02-02 | Paper |
YOSO: You only speak once. Secure MPC with stateless ephemeral roles | 2022-04-22 | Paper |
Can a public blockchain keep a secret? | 2021-12-01 | Paper |
On the local leakage resilience of linear secret sharing schemes | 2021-06-28 | Paper |
On fully secure MPC with solitary output | 2020-04-30 | Paper |
Efficient RSA key generation and threshold Paillier in the two-party setting | 2019-06-20 | Paper |
Best possible information-theoretic MPC | 2018-12-06 | Paper |
On the local leakage resilience of linear secret sharing schemes | 2018-09-12 | Paper |
Secure two-party computation with fairness -- a necessary design principle | 2018-01-19 | Paper |
Robust non-interactive multiparty computation against constant-size collusion | 2017-11-03 | Paper |
Asynchronous secure computations with optimal resilience (extended abstract) | 2017-09-29 | Paper |
On Compression of Data Encrypted With Block Ciphers | 2017-06-08 | Paper |
Secure Multiparty Computation with General Interaction Patterns | 2016-04-15 | Paper |
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography | 2016-03-02 | Paper |
On the composition of authenticated Byzantine Agreement | 2015-12-04 | Paper |
Robust and Efficient Sharing of RSA Functions | 2015-11-11 | Paper |
Distributed pseudo-random bit generators---a new way to speed-up shared coin tossing | 2015-09-11 | Paper |
Fast asynchronous Byzantine agreement with optimal resilience | 2015-05-07 | Paper |
The round complexity of verifiable secret sharing and secure multicast | 2015-02-27 | Paper |
Protecting Circuits from Computationally Bounded and Noisy Leakage | 2015-02-09 | Paper |
Information-theoretically secure protocols and security under composition | 2014-11-25 | Paper |
Robust Threshold DSS Signatures | 2014-08-20 | Paper |
Sequential composition of protocols without simultaneous termination | 2014-07-25 | Paper |
A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness | 2013-03-18 | Paper |
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting | 2012-06-08 | Paper |
Secure computation without authentication | 2012-01-13 | Paper |
Perfectly-Secure Multiplication for Any t < n/3 | 2011-08-12 | Paper |
Security for Signcryption: The Two-User Model | 2011-05-18 | Paper |
Information-Theoretically Secure Protocols and Security under Composition | 2010-11-04 | Paper |
On the composition of authenticated byzantine agreement | 2010-08-05 | Paper |
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead | 2010-07-06 | Paper |
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases | 2010-06-01 | Paper |
Secure Network Coding over the Integers | 2010-05-28 | Paper |
The Round Complexity of Verifiable Secret Sharing Revisited | 2009-10-20 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q3524717 | 2008-09-12 | Paper |
Threshold RSA for Dynamic and Ad-Hoc Groups | 2008-04-15 | Paper |
Secure Computation Without Authentication | 2008-03-17 | Paper |
Degradation and Amplification of Computational Hardness | 2008-03-05 | Paper |
Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
Secure distributed key generation for discrete-log based cryptosystems | 2007-05-24 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737237 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418550 | 2003-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409117 | 2003-06-30 | Paper |
Robust threshold DSS signatures | 2003-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724430 | 2002-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536797 | 2002-07-28 | Paper |
RSA-based undeniable signatures | 2000-12-21 | Paper |
Secure distributed storage and retrieval | 2000-08-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941850 | 2000-07-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250769 | 2000-03-07 | Paper |
Robust and efficient sharing of RSA functions. | 2000-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249323 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249641 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250770 | 1999-06-17 | Paper |
Secure Hash-and-Sign Signatures Without the Random Oracle | 1999-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364547 | 1998-05-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279578 | 1994-09-20 | Paper |