| Publication | Date of Publication | Type |
|---|
| Making an asymmetric PAKE quantum-annoying by hiding group elements | 2024-06-05 | Paper |
| Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation | 2024-04-26 | Paper |
| A reduction-based proof for authentication and session key security in three-party Kerberos | 2023-09-15 | Paper |
| Post-quantum asynchronous deniable key exchange and the signal handshake | 2023-08-10 | Paper |
| Benchmarking post-quantum cryptography in TLS | 2022-10-13 | Paper |
| More efficient post-quantum KEMTLS with pre-distributed public keys | 2022-06-15 | Paper |
| Post-quantum key-blinding for authentication in anonymity networks | 2022-06-15 | Paper |
| Improved attacks against key reuse in learning with errors key exchange | 2022-06-15 | Paper |
| Towards post-quantum security for signal's X3DH handshake | 2022-03-25 | Paper |
| The ``Quantum annoying property of password-authenticated key exchange protocols | 2022-03-22 | Paper |
| A cryptographic analysis of the TLS 1.3 handshake protocol | 2021-09-10 | Paper |
| A formal security analysis of the Signal messaging protocol | 2020-11-06 | Paper |
| Hybrid key encapsulation mechanisms and authenticated key exchange | 2020-02-25 | Paper |
| Protocols for authentication and key establishment | 2019-10-10 | Paper |
| Transitioning to a quantum-resistant public key infrastructure | 2018-09-12 | Paper |
| Post-quantum key exchange for the Internet and the open quantum safe project | 2018-02-16 | Paper |
| Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures | 2017-06-13 | Paper |
| From Identification to Signatures, Tightly: A Framework and Generic Transforms | 2017-01-06 | Paper |
| Safely exporting keys from secure channels. On the security of EAP-TLS and TLS key exporters | 2016-09-09 | Paper |
| From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS | 2016-04-08 | Paper |
| Continuous after-the-fact leakage-resilient eCK-secure key exchange | 2016-01-12 | Paper |
| Modelling ciphersuite and version negotiation in the TLS protocol | 2015-10-20 | Paper |
| Hierarchical deterministic bitcoin wallets that tolerate key leakage | 2015-09-29 | Paper |
| Double-authentication-preventing signatures | 2015-07-24 | Paper |
| ASICS: Authenticated key exchange security incorporating certification systems | 2014-10-16 | Paper |
| Continuous After-the-Fact Leakage-Resilient Key Exchange | 2014-07-24 | Paper |
| Quantum one-time programs. (Extended abstract) | 2013-09-17 | Paper |
| Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two | 2013-06-28 | Paper |
| Quantum key distribution in the classical authenticated key exchange framework | 2013-06-14 | Paper |
| Anonymity and one-way authentication in key exchange protocols | 2013-04-03 | Paper |
| Efficient modular exponentiation-based puzzles for denial-of-service protection | 2012-11-01 | Paper |
| Publicly verifiable ciphertexts | 2012-09-25 | Paper |
| Effort-release public-key encryption from cryptographic puzzles | 2012-09-07 | Paper |
| Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy | 2011-12-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3000895 | 2011-05-31 | Paper |
| Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols | 2011-02-11 | Paper |
| The case for quantum key distribution | 2010-12-21 | Paper |
| Fixed argument pairings | 2010-08-31 | Paper |
| Towards Denial-of-Service-Resilient Key Agreement Protocols | 2009-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450735 | 2004-02-16 | Paper |
| An End-to-End Systems Approach to Elliptic Curve Cryptography | 2003-09-11 | Paper |