| Publication | Date of Publication | Type |
|---|
| Bare PAKE: universally composable key exchange from just passwords | 2024-12-04 | Paper |
| Short concurrent covert authenticated key exchange (short cAKE) | 2024-06-26 | Paper |
| Randomized half-ideal cipher on groups with applications to UC (a)PAKE | 2023-12-08 | Paper |
| Password Authenticated Key Exchange | 2023-08-04 | Paper |
| Universally composable relaxed password authenticated key exchange | 2022-11-09 | Paper |
| Asymmetric PAKE with low computation \textit{and} communication | 2022-08-30 | Paper |
| TOPPSS: Cost-Minimal Password-Protected Secret Sharing Based on Threshold OPRF | 2022-07-01 | Paper |
| KHAPE: Asymmetric PAKE from key-hiding key exchange | 2022-05-18 | Paper |
| On pseudorandom encodings | 2022-03-23 | Paper |
| On the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blinding | 2021-12-21 | Paper |
| Strong asymmetric PAKE based on trapdoor CKEM | 2020-03-09 | Paper |
| Password-authenticated public-key encryption | 2020-01-30 | Paper |
| Round-reduced modular construction of asymmetric password-authenticated key exchange | 2018-10-17 | Paper |
| 3PC ORAM with low latency, low bandwidth, and fast batch retrieval | 2018-08-10 | Paper |
| OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks | 2018-07-17 | Paper |
| Two-factor authentication with end-to-end password security | 2018-05-29 | Paper |
| Efficient covert two-party computation | 2018-05-16 | Paper |
| Fast Exponentiation Using Split Exponents | 2017-07-27 | Paper |
| Three-Party ORAM for Secure Computation | 2016-06-10 | Paper |
| Efficient Concurrent Covert Computation of String Equality and Set Intersection | 2016-04-08 | Paper |
| Robust and Efficient Sharing of RSA Functions | 2015-11-11 | Paper |
| Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model | 2015-01-06 | Paper |
| Robust Threshold DSS Signatures | 2014-08-20 | Paper |
| Practical Covert Authentication | 2014-03-25 | Paper |
| Authenticated key agreement with key re-use in the short authenticated strings model | 2014-01-03 | Paper |
| Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries | 2013-09-02 | Paper |
| Cryptographic Primitives Enforcing Communication and Storage Complexity | 2011-04-20 | Paper |
| Fast Secure Computation of Set Intersection | 2010-09-10 | Paper |
| Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model | 2010-09-10 | Paper |
| Identity-Based Aggregate and Multi-Signature Schemes Based on RSA | 2010-05-28 | Paper |
| Private Mutual Authentication and Conditional Oblivious Transfer | 2009-10-20 | Paper |
| Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes | 2009-03-10 | Paper |
| Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection | 2009-03-03 | Paper |
| Proactive RSA with Non-interactive Signing | 2009-02-12 | Paper |
| Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem | 2008-11-20 | Paper |
| Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials | 2008-08-19 | Paper |
| Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange | 2008-04-24 | Paper |
| Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement | 2008-04-17 | Paper |
| Efficient signature schemes with tight reductions to the Diffie-Hellman problems | 2007-12-06 | Paper |
| Efficient Two-Party Secure Computation on Committed Inputs | 2007-11-29 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Secure distributed key generation for discrete-log based cryptosystems | 2007-05-24 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Secure acknowledgment aggregation and multisignatures with limited robustness | 2006-06-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3374910 | 2006-03-01 | Paper |
| Financial Cryptography and Data Security | 2005-12-22 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Secret Handshakes from CA-Oblivious Encryption | 2005-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434889 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418566 | 2003-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418550 | 2003-08-10 | Paper |
| Robust threshold DSS signatures | 2003-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941850 | 2000-07-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250769 | 2000-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343446 | 1997-07-06 | Paper |