| Publication | Date of Publication | Type |
|---|
Security without trusted third parties: VRF-based authentication with short authenticated strings | 2026-03-31 | Paper |
Bare PAKE: universally composable key exchange from just passwords | 2024-12-04 | Paper |
Short concurrent covert authenticated key exchange (short cAKE) | 2024-06-26 | Paper |
Randomized half-ideal cipher on groups with applications to UC (a)PAKE Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Password Authenticated Key Exchange Asymmetric Cryptography | 2023-08-04 | Paper |
Universally composable relaxed password authenticated key exchange | 2022-11-09 | Paper |
Asymmetric PAKE with low computation \textit{and} communication | 2022-08-30 | Paper |
TOPPSS: cost-minimal password-protected secret sharing based on threshold OPRF | 2022-07-01 | Paper |
KHAPE: Asymmetric PAKE from key-hiding key exchange | 2022-05-18 | Paper |
On pseudorandom encodings | 2022-03-23 | Paper |
On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding | 2021-12-21 | Paper |
Strong asymmetric PAKE based on trapdoor CKEM | 2020-03-09 | Paper |
Password-authenticated public-key encryption | 2020-01-30 | Paper |
Round-reduced modular construction of asymmetric password-authenticated key exchange | 2018-10-17 | Paper |
3PC ORAM with low latency, low bandwidth, and fast batch retrieval | 2018-08-10 | Paper |
OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks | 2018-07-17 | Paper |
Two-factor authentication with end-to-end password security | 2018-05-29 | Paper |
Efficient covert two-party computation | 2018-05-16 | Paper |
Fast Exponentiation Using Split Exponents IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Three-party ORAM for secure computation Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Efficient Concurrent Covert Computation of String Equality and Set Intersection Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Robust and efficient sharing of RSA functions Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model Lecture Notes in Computer Science | 2015-01-06 | Paper |
Robust threshold DSS signatures Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Practical covert authentication Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Authenticated key agreement with key re-use in the short authenticated strings model Computational and Combinatorial Group Theory and Cryptography | 2014-01-03 | Paper |
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Cryptographic primitives enforcing communication and storage complexity Financial Cryptography | 2011-04-20 | Paper |
Fast secure computation of set intersection Lecture Notes in Computer Science | 2010-09-10 | Paper |
Authenticated key agreement with key re-use in the short authenticated strings model Lecture Notes in Computer Science | 2010-09-10 | Paper |
Identity-based aggregate and multi-signature schemes based on RSA Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Private Mutual Authentication and Conditional Oblivious Transfer Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Applied Cryptography and Network Security | 2009-03-10 | Paper |
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection Theory of Cryptography | 2009-03-03 | Paper |
Proactive RSA with Non-interactive Signing Financial Cryptography and Data Security | 2009-02-12 | Paper |
Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem Lecture Notes in Computer Science | 2008-11-20 | Paper |
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials Automata, Languages and Programming | 2008-08-19 | Paper |
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement Lecture Notes in Computer Science | 2008-04-17 | Paper |
Efficient signature schemes with tight reductions to the Diffie-Hellman problems Journal of Cryptology | 2007-12-06 | Paper |
Efficient Two-Party Secure Computation on Committed Inputs Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Secure distributed key generation for discrete-log based cryptosystems Journal of Cryptology | 2007-05-24 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Secure acknowledgment aggregation and multisignatures with limited robustness Computer Networks | 2006-06-30 | Paper |
scientific article; zbMATH DE number 5009201 (Why is no real title available?) | 2006-03-01 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Secret Handshakes from CA-Oblivious Encryption | 2005-08-12 | Paper |
scientific article; zbMATH DE number 2009970 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 1962743 (Why is no real title available?) | 2003-08-11 | Paper |
scientific article; zbMATH DE number 1962164 (Why is no real title available?) | 2003-08-10 | Paper |
Robust threshold DSS signatures Information and Computation | 2003-01-14 | Paper |
scientific article; zbMATH DE number 1418290 (Why is no real title available?) | 2000-07-19 | Paper |
scientific article; zbMATH DE number 1304079 (Why is no real title available?) | 2000-03-07 | Paper |
scientific article; zbMATH DE number 1031003 (Why is no real title available?) | 1997-07-06 | Paper |