| Publication | Date of Publication | Type |
|---|
| Universally composable relaxed asymmetric password-authenticated key exchange | 2025-01-10 | Paper |
| 1-out-of-\(n\) oblivious signatures: security revisited and a generic construction with an efficient communication cost | 2024-05-31 | Paper |
| Auditable attribute-based credentials scheme and its application in contact tracing | 2024-05-31 | Paper |
| Analysis of (U,U+V)-code problem with Gramian over binary and ternary fields | 2023-08-21 | Paper |
| Pointcheval-Sanders signature-based synchronized aggregate signature | 2023-08-21 | Paper |
| Turn-based communication channels | 2023-04-13 | Paper |
| Watermarkable signature with computational function preserving | 2023-03-21 | Paper |
| Receiver selective opening CCA secure public key encryption from various assumptions | 2023-03-21 | Paper |
| Non-committing encryption with constant ciphertext expansion from standard assumptions | 2023-03-21 | Paper |
| Approximation and special cases of common subtrees and editing distance | 2023-01-25 | Paper |
| Forward secure message franking | 2022-12-07 | Paper |
| Efficient two-party exponentiation from quotient transfer | 2022-11-09 | Paper |
| Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
| Payment trees: low collateral payments for payment channel networks | 2022-06-22 | Paper |
| Obfustopia built on secret-key functional encryption | 2022-06-08 | Paper |
| CCA security and trapdoor functions via key-dependent-message security | 2022-04-04 | Paper |
| Security definitions on time-lock puzzles | 2022-03-24 | Paper |
| Secret sharing with statistical privacy and computational relaxed non-malleability | 2022-03-24 | Paper |
| Generic transformation from broadcast encryption to round-optimal deniable ring authentication | 2022-03-21 | Paper |
| Impossibility on tamper-resilient cryptography with uniqueness properties | 2021-12-21 | Paper |
| Tightly secure ring signatures in the standard model | 2021-10-21 | Paper |
| Fine-grained cryptography revisited | 2021-07-30 | Paper |
| Simple and generic constructions of succinct functional encryption | 2021-07-30 | Paper |
| Improved security proof for the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme | 2021-06-08 | Paper |
| A t-out-of-n Redactable Signature Scheme | 2020-07-20 | Paper |
| Fine-grained cryptography revisited | 2020-05-11 | Paper |
| Simple and efficient KDM-CCA secure public key encryption | 2020-05-11 | Paper |
| Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem | 2020-05-11 | Paper |
| Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
| CCA security and trapdoor functions via key-dependent-message security | 2020-03-09 | Paper |
| Anonymous single-round server-aided verification | 2020-03-02 | Paper |
| Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions | 2019-10-18 | Paper |
| A framework for achieving KDM-CCA secure public-key encryption | 2019-01-23 | Paper |
| Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
| Lower bounds for key length of \(k\)-wise almost independent permutations and certain symmetric-key encryption schemes | 2018-10-24 | Paper |
| Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions | 2018-10-17 | Paper |
| Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
| CCA2 key-privacy for code-based encryption in the standard model | 2018-09-12 | Paper |
| Memory lower bounds of reductions revisited | 2018-07-09 | Paper |
| Obfustopia built on secret-key functional encryption | 2018-07-09 | Paper |
| Simple and generic constructions of succinct functional encryption | 2018-05-29 | Paper |
| Key dependent message security and receiver selective opening security for identity-based encryption | 2018-05-16 | Paper |
| How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones | 2017-01-06 | Paper |
| Signatures Resilient to Uninvertible Leakage | 2016-10-21 | Paper |
| On the complexity of negation-limited Boolean networks (preliminary version) | 2016-09-01 | Paper |
| On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions | 2016-04-13 | Paper |
| Completeness of Single-Bit Projection-KDM Security for Public Key Encryption | 2016-03-02 | Paper |
| Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency | 2015-10-20 | Paper |
| Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency | 2015-09-29 | Paper |
| Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks | 2015-09-11 | Paper |
| Game-Theoretic Security for Bit Commitment | 2014-09-15 | Paper |
| Attacks to the Proxy Re-Encryption Schemes from IWSEC2011 | 2014-09-15 | Paper |
| Strongly Simulation-Extractable Leakage-Resilient NIZK | 2014-07-24 | Paper |
| Factoring-Based Proxy Re-Encryption Schemes | 2013-10-23 | Paper |
| Grey-Box Public-Key Steganography | 2013-05-28 | Paper |
| Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability | 2013-04-04 | Paper |
| Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 | 2013-03-18 | Paper |
| Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees | 2013-02-19 | Paper |
| Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs | 2012-09-07 | Paper |
| A Game-Theoretic Perspective on Oblivious Transfer | 2012-09-07 | Paper |
| Weak Oblivious Transfer from Strong One-Way Functions | 2011-09-16 | Paper |
| Randomness Leakage in the KEM/DEM Framework | 2011-09-16 | Paper |
| Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity | 2011-05-19 | Paper |
| A Multi-trapdoor Commitment Scheme from the RSA Assumption | 2010-10-25 | Paper |
| CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model | 2010-05-28 | Paper |
| Security of Encryption Schemes in Weakened Random Oracle Models | 2010-05-28 | Paper |
| Efficient public key encryption based on ideal lattices (extended abstract) | 2009-12-15 | Paper |
| Efficient non-interactive universally composable string-commitment schemes | 2009-12-11 | Paper |
| Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge | 2009-12-11 | Paper |
| On the insecurity of the Fiat-Shamir signatures with iterative hash functions | 2009-12-11 | Paper |
| Algorithms and Computation | 2009-08-07 | Paper |
| Limiting negations in bounded-depth circuits: an extension of Markov's theorem | 2009-07-21 | Paper |
| Multi-recipient Public-Key Encryption from Simulators in Security Proofs | 2009-06-25 | Paper |
| On the Weak Ideal Compression Functions | 2009-06-25 | Paper |
| Security on Hybrid Encryption with the Tag-KEM/DEM Framework | 2009-06-25 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Anonymity on Paillier’s Trap-Door Permutation | 2009-03-06 | Paper |
| Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems | 2009-02-10 | Paper |
| Public-Key Cryptosystems with Primitive Power Roots of Unity | 2008-07-08 | Paper |
| Universally Anonymizable Public-Key Encryption | 2008-03-18 | Paper |
| Security of Digital Signature Schemes in Weakened Random Oracle Models | 2008-03-05 | Paper |
| PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity | 2007-09-07 | Paper |
| Multi-bit Cryptosystems Based on Lattice Problems | 2007-09-04 | Paper |
| Notch effect on fatigue strength reduction of bearing steel in the very high cycle regime | 2006-10-27 | Paper |
| Smart structure for suppression of mode I and II crack propagation in CFRP laminates by shape memory alloy TiNi actuator | 2006-10-10 | Paper |
| Mode II fatigue crack growth from delamination in unidirectional tape and satin-woven fabric laminates of high strength GFRP | 2006-10-10 | Paper |
| Fatigue damage evaluation in SiCp/2024 by X-ray diffraction method | 2006-10-10 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
| Quantum bit-commitment for small storage based on quantum one-way permutations | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536799 | 2002-10-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4548325 | 2002-08-26 | Paper |
| An exponential gap with the removal of one negation gate | 2002-07-14 | Paper |
| An extension of Grover's quantum search algorithm | 2001-09-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4503971 | 2001-02-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4505401 | 2000-09-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4937871 | 2000-02-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4935140 | 2000-01-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4705469 | 1999-12-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4703654 | 1999-12-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4703849 | 1999-12-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4253361 | 1999-11-08 | Paper |
| Minimizing maximum absolute lateness and range of lateness under generalized due dates on a single machine | 1999-06-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4234108 | 1999-03-16 | Paper |
| On the Complexity of Negation-Limited Boolean Networks | 1998-09-20 | Paper |
| Minimizing The Range Of Lateness On A Single Machine Under Generalized Due Dates | 1998-09-07 | Paper |
| Negation-limited circuit complexity of symmetric functions | 1997-02-27 | Paper |
| A Dislocation Model for Fatigue Crack Initiation | 1981-01-01 | Paper |