| Publication | Date of Publication | Type |
|---|
| Making an asymmetric PAKE quantum-annoying by hiding group elements | 2024-06-05 | Paper |
| Post-Quantum Signatures in DNSSEC via Request-Based Fragmentation | 2024-04-26 | Paper |
A reduction-based proof for authentication and session key security in three-party Kerberos International Journal of Applied Cryptography | 2023-09-15 | Paper |
Post-quantum asynchronous deniable key exchange and the signal handshake Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
Benchmarking post-quantum cryptography in TLS Post-Quantum Cryptography | 2022-10-13 | Paper |
| More efficient post-quantum KEMTLS with pre-distributed public keys | 2022-06-15 | Paper |
| Post-quantum key-blinding for authentication in anonymity networks | 2022-06-15 | Paper |
| Improved attacks against key reuse in learning with errors key exchange | 2022-06-15 | Paper |
| Towards post-quantum security for signal's X3DH handshake | 2022-03-25 | Paper |
| The ``Quantum annoying property of password-authenticated key exchange protocols | 2022-03-22 | Paper |
A cryptographic analysis of the TLS 1.3 handshake protocol Journal of Cryptology | 2021-09-10 | Paper |
A formal security analysis of the Signal messaging protocol Journal of Cryptology | 2020-11-06 | Paper |
| Hybrid key encapsulation mechanisms and authenticated key exchange | 2020-02-25 | Paper |
Protocols for authentication and key establishment Information Security and Cryptography | 2019-10-10 | Paper |
| Transitioning to a quantum-resistant public key infrastructure | 2018-09-12 | Paper |
| Post-quantum key exchange for the Internet and the open quantum safe project | 2018-02-16 | Paper |
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures Lecture Notes in Computer Science | 2017-06-13 | Paper |
From Identification to Signatures, Tightly: A Framework and Generic Transforms Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Safely exporting keys from secure channels. On the security of EAP-TLS and TLS key exporters Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Continuous after-the-fact leakage-resilient eCK-secure key exchange Cryptography and Coding | 2016-01-12 | Paper |
Modelling ciphersuite and version negotiation in the TLS protocol Information Security and Privacy | 2015-10-20 | Paper |
Hierarchical deterministic bitcoin wallets that tolerate key leakage Financial Cryptography and Data Security | 2015-09-29 | Paper |
Double-authentication-preventing signatures Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
ASICS: Authenticated key exchange security incorporating certification systems Lecture Notes in Computer Science | 2014-10-16 | Paper |
Continuous After-the-Fact Leakage-Resilient Key Exchange Information Security and Privacy | 2014-07-24 | Paper |
Quantum one-time programs. (Extended abstract) Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two Information Security and Privacy | 2013-06-28 | Paper |
Quantum key distribution in the classical authenticated key exchange framework Post-Quantum Cryptography | 2013-06-14 | Paper |
Quantum key distribution in the classical authenticated key exchange framework Post-Quantum Cryptography | 2013-06-14 | Paper |
Anonymity and one-way authentication in key exchange protocols Designs, Codes and Cryptography | 2013-04-03 | Paper |
Efficient modular exponentiation-based puzzles for denial-of-service protection Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Publicly verifiable ciphertexts Lecture Notes in Computer Science | 2012-09-25 | Paper |
Effort-release public-key encryption from cryptographic puzzles Information Security and Privacy | 2012-09-07 | Paper |
Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy Lecture Notes in Computer Science | 2011-12-16 | Paper |
scientific article; zbMATH DE number 5901453 (Why is no real title available?) (available as arXiv preprint) | 2011-05-31 | Paper |
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
The case for quantum key distribution Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | 2010-12-21 | Paper |
The case for quantum key distribution Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | 2010-12-21 | Paper |
Fixed argument pairings Lecture Notes in Computer Science | 2010-08-31 | Paper |
Towards Denial-of-Service-Resilient Key Agreement Protocols Information Security and Privacy | 2009-06-25 | Paper |
| scientific article; zbMATH DE number 2043312 (Why is no real title available?) | 2004-02-16 | Paper |
| An End-to-End Systems Approach to Elliptic Curve Cryptography | 2003-09-11 | Paper |