| Publication | Date of Publication | Type |
|---|
| SPRINT: high-throughput robust distributed Schnorr signatures | 2024-11-13 | Paper |
| Proactive secret sharing with constant communication | 2024-08-02 | Paper |
| Additive randomized encodings and their applications | 2024-02-02 | Paper |
| YOSO: You only speak once. Secure MPC with stateless ephemeral roles | 2022-04-22 | Paper |
| Can a public blockchain keep a secret? | 2021-12-01 | Paper |
| On the local leakage resilience of linear secret sharing schemes | 2021-06-28 | Paper |
| On fully secure MPC with solitary output | 2020-04-30 | Paper |
| Efficient RSA key generation and threshold Paillier in the two-party setting | 2019-06-20 | Paper |
| Best possible information-theoretic MPC | 2018-12-06 | Paper |
| On the local leakage resilience of linear secret sharing schemes | 2018-09-12 | Paper |
| Secure two-party computation with fairness -- a necessary design principle | 2018-01-19 | Paper |
| Robust non-interactive multiparty computation against constant-size collusion | 2017-11-03 | Paper |
| Asynchronous secure computations with optimal resilience (extended abstract) | 2017-09-29 | Paper |
| On Compression of Data Encrypted With Block Ciphers | 2017-06-08 | Paper |
| Secure multiparty computation with general interaction patterns | 2016-04-15 | Paper |
| Simplified VSS and fast-track multiparty computations with applications to threshold cryptography | 2016-03-02 | Paper |
| On the composition of authenticated Byzantine Agreement | 2015-12-04 | Paper |
| Robust and Efficient Sharing of RSA Functions | 2015-11-11 | Paper |
| Distributed pseudo-random bit generators---a new way to speed-up shared coin tossing | 2015-09-11 | Paper |
| Fast asynchronous Byzantine agreement with optimal resilience | 2015-05-07 | Paper |
| The round complexity of verifiable secret sharing and secure multicast | 2015-02-27 | Paper |
| Protecting Circuits from Computationally Bounded and Noisy Leakage | 2015-02-09 | Paper |
| Information-theoretically secure protocols and security under composition | 2014-11-25 | Paper |
| Robust Threshold DSS Signatures | 2014-08-20 | Paper |
| Sequential composition of protocols without simultaneous termination | 2014-07-25 | Paper |
| A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness | 2013-03-18 | Paper |
| Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting | 2012-06-08 | Paper |
| Secure computation without authentication | 2012-01-13 | Paper |
| Perfectly-Secure Multiplication for Any t < n/3 | 2011-08-12 | Paper |
| Security for Signcryption: The Two-User Model | 2011-05-18 | Paper |
| Information-Theoretically Secure Protocols and Security under Composition | 2010-11-04 | Paper |
| On the composition of authenticated byzantine agreement | 2010-08-05 | Paper |
| Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead | 2010-07-06 | Paper |
| Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases | 2010-06-01 | Paper |
| Secure network coding over the integers | 2010-05-28 | Paper |
| The Round Complexity of Verifiable Secret Sharing Revisited | 2009-10-20 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Cryptography and game theory | 2008-09-12 | Paper |
| Threshold RSA for Dynamic and Ad-Hoc Groups | 2008-04-15 | Paper |
| Secure Computation Without Authentication | 2008-03-17 | Paper |
| Degradation and Amplification of Computational Hardness | 2008-03-05 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Secure distributed key generation for discrete-log based cryptosystems | 2007-05-24 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737237 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418550 | 2003-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4409117 | 2003-06-30 | Paper |
| Robust threshold DSS signatures | 2003-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724430 | 2002-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536797 | 2002-07-28 | Paper |
| RSA-based undeniable signatures | 2000-12-21 | Paper |
| Secure distributed storage and retrieval | 2000-08-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941850 | 2000-07-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250769 | 2000-03-07 | Paper |
| Robust and efficient sharing of RSA functions. | 2000-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249323 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250770 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249641 | 1999-06-17 | Paper |
| Secure Hash-and-Sign Signatures Without the Random Oracle | 1999-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364547 | 1998-05-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279578 | 1994-09-20 | Paper |