| Publication | Date of Publication | Type |
|---|
Modeling noise-accepting key exchange | 2024-06-05 | Paper |
On optimal tightness for key exchange with full forward secrecy via key confirmation Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Offline Assisted Group Key Exchange Developments in Language Theory | 2023-06-30 | Paper |
Fast and secure updatable encryption | 2022-11-09 | Paper |
Practical mathematical cryptography | 2022-11-03 | Paper |
Pribank: confidential blockchain scaling using short commit-and-proof NIZK argument | 2022-07-06 | Paper |
Practical isogeny-based key-exchange with optimal tightness | 2022-03-25 | Paper |
Security notions for disk encryption Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
Lattice-based proof of shuffle and applications to electronic voting | 2021-12-20 | Paper |
Cloud-assisted asynchronous key transport with post-quantum security | 2021-06-08 | Paper |
A blind coupon mechanism enabling veto voting over unreliable networks | 2020-05-12 | Paper |
Highly efficient key exchange protocols with optimal tightness | 2020-03-09 | Paper |
Security notions for cloud storage and deduplication | 2018-11-07 | Paper |
Practical and tightly-secure digital signatures and authenticated key exchange | 2018-09-26 | Paper |
Malware, encryption, and rerandomization -- everything Is under attack | 2017-10-23 | Paper |
Spreading alerts quietly and the subgroup escape problem Journal of Cryptology | 2016-01-11 | Paper |
A novel framework for protocol analysis Provable Security | 2011-09-16 | Paper |
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Round-Optimal Blind Signatures from Waters Signatures Provable Security | 2009-01-27 | Paper |
Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks Public Key Infrastructure | 2008-06-12 | Paper |
A Latency-Free Election Scheme Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
A framework for compositional verification of security protocols Information and Computation | 2008-04-16 | Paper |
Spreading Alerts Quietly and the Subgroup Escape Problem Lecture Notes in Computer Science | 2008-03-18 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |