| Publication | Date of Publication | Type |
|---|
| Making an asymmetric PAKE quantum-annoying by hiding group elements | 2024-06-05 | Paper |
| Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation | 2024-04-26 | Paper |
| A reduction-based proof for authentication and session key security in three-party Kerberos | 2023-09-15 | Paper |
| Post-quantum asynchronous deniable key exchange and the signal handshake | 2023-08-10 | Paper |
| Benchmarking Post-quantum Cryptography in TLS | 2022-10-13 | Paper |
| More efficient post-quantum KEMTLS with pre-distributed public keys | 2022-06-15 | Paper |
| Post-quantum key-blinding for authentication in anonymity networks | 2022-06-15 | Paper |
| Improved attacks against key reuse in learning with errors key exchange | 2022-06-15 | Paper |
| Towards post-quantum security for signal's X3DH handshake | 2022-03-25 | Paper |
| The ``Quantum annoying property of password-authenticated key exchange protocols | 2022-03-22 | Paper |
| A cryptographic analysis of the TLS 1.3 handshake protocol | 2021-09-10 | Paper |
| A formal security analysis of the Signal messaging protocol | 2020-11-06 | Paper |
| Hybrid key encapsulation mechanisms and authenticated key exchange | 2020-02-25 | Paper |
| Protocols for Authentication and Key Establishment | 2019-10-10 | Paper |
| Transitioning to a quantum-resistant public key infrastructure | 2018-09-12 | Paper |
| Post-quantum key exchange for the Internet and the open quantum safe project | 2018-02-16 | Paper |
| Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures | 2017-06-13 | Paper |
| From Identification to Signatures, Tightly: A Framework and Generic Transforms | 2017-01-06 | Paper |
| Safely Exporting Keys from Secure Channels | 2016-09-09 | Paper |
| From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS | 2016-04-08 | Paper |
| Continuous After-the-Fact Leakage-Resilient eCK-Secure Key Exchange | 2016-01-12 | Paper |
| Modelling Ciphersuite and Version Negotiation in the TLS Protocol | 2015-10-20 | Paper |
| Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage | 2015-09-29 | Paper |
| Double-Authentication-Preventing Signatures | 2015-07-24 | Paper |
| ASICS: Authenticated Key Exchange Security Incorporating Certification Systems | 2014-10-16 | Paper |
| Continuous After-the-Fact Leakage-Resilient Key Exchange | 2014-07-24 | Paper |
| Quantum One-Time Programs | 2013-09-17 | Paper |
| Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two | 2013-06-28 | Paper |
| Quantum Key Distribution in the Classical Authenticated Key Exchange Framework | 2013-06-14 | Paper |
| Anonymity and one-way authentication in key exchange protocols | 2013-04-03 | Paper |
| Efficient modular exponentiation-based puzzles for denial-of-service protection | 2012-11-01 | Paper |
| Publicly verifiable ciphertexts | 2012-09-25 | Paper |
| Effort-release public-key encryption from cryptographic puzzles | 2012-09-07 | Paper |
| Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy | 2011-12-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3000895 | 2011-05-31 | Paper |
| Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols | 2011-02-11 | Paper |
| The case for quantum key distribution | 2010-12-21 | Paper |
| Fixed argument pairings | 2010-08-31 | Paper |
| Towards Denial-of-Service-Resilient Key Agreement Protocols | 2009-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450735 | 2004-02-16 | Paper |
| An End-to-End Systems Approach to Elliptic Curve Cryptography | 2003-09-11 | Paper |