| Publication | Date of Publication | Type |
|---|
| IP masking with generic security guarantees under minimum assumptions, and applications | 2026-03-31 | Paper |
| Round efficient Byzantine agreement from VDFs | 2025-01-10 | Paper |
| Shared-custodial password-authenticated deterministic wallets | 2025-01-10 | Paper |
| Connecting leakage-resilient secret sharing to practice: scaling trends and physical dependencies of prime field masking | 2024-11-13 | Paper |
| From random probing to noisy leakages without field-size dependence | 2024-11-13 | Paper |
Individual cryptography Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Combined fault and leakage resilience: composability, constructions and compiler Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Putting the online phase on a diet: covert security from short MACs Topics in Cryptology – CT-RSA 2023 | 2023-10-04 | Paper |
Continuously non-malleable codes against bounded-depth tampering Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Financially backed covert security Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
On the related-key attack security of authenticated encryption schemes Lecture Notes in Computer Science | 2023-07-25 | Paper |
Generalized channels from limited blockchain scripts and adaptor signatures Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Towards tight random probing security | 2022-04-22 | Paper |
| Two-party adaptor signatures from identification schemes | 2021-12-21 | Paper |
| Generic compiler for publicly verifiable covert multi-party computation | 2021-12-08 | Paper |
Continuously non-malleable codes in the split-state model Journal of Cryptology | 2020-11-06 | Paper |
| Simple refreshing in the noisy leakage model | 2020-05-11 | Paper |
| Multi-party virtual state channels | 2020-02-04 | Paper |
Making masking security proofs concrete (or how to evaluate the security of any leaking device), extended version Journal of Cryptology | 2019-11-27 | Paper |
Unifying leakage models: from probing attacks to noisy leakage Journal of Cryptology | 2019-01-29 | Paper |
| Amortizing randomness complexity in private circuits | 2018-04-06 | Paper |
| Consolidating inner product masking | 2018-04-06 | Paper |
| Position-based cryptography and multiparty communication complexity | 2018-01-19 | Paper |
| Non-malleable codes for space-bounded tampering | 2017-11-15 | Paper |
Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model Lecture Notes in Computer Science | 2017-06-13 | Paper |
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Bounded tamper resilience: how to go beyond the algebraic barrier Journal of Cryptology | 2017-03-02 | Paper |
Towards sound fresh re-keying with hard (physical) learning problems Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Circuit compilers with \(O(1/\log (n))\) leakage rate Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Signature schemes secure against hard-to-invert leakage Journal of Cryptology | 2016-06-01 | Paper |
Chosen-ciphertext security from subset sum Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Optimal amplification of noisy leakages Theory of Cryptography | 2016-04-08 | Paper |
Efficient leakage resilient circuit compilers Lecture Notes in Computer Science | 2016-03-02 | Paper |
Proofs of space Lecture Notes in Computer Science | 2015-12-10 | Paper |
Making Masking Security Proofs Concrete Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Noisy leakage revisited Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Inner product masking revisited Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
The Chaining Lemma and its application Lecture Notes in Computer Science | 2015-09-24 | Paper |
A tamper and leakage resilient von Neumann architecture Lecture Notes in Computer Science | 2015-08-27 | Paper |
Protecting circuits from computationally bounded and noisy leakage SIAM Journal on Computing | 2015-02-09 | Paper |
On the Non-malleability of the Fiat-Shamir Transform Lecture Notes in Computer Science | 2014-08-20 | Paper |
Efficient non-malleable codes and key-derivation for poly-size tampering circuits Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Unifying leakage models: from probing attacks to noisy leakage. Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Continuous non-malleable codes Theory of Cryptography | 2014-02-18 | Paper |
Bounded tamper resilience: how to go beyond the algebraic barrier Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Outsourced pattern matching Automata, Languages, and Programming | 2013-08-07 | Paper |
Theory and practice of a leakage resilient masking scheme Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Signature schemes secure against hard-to-invert leakage Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Practical leakage-resilient symmetric cryptography Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Leakage-resilient circuits without computational assumptions Theory of Cryptography | 2012-06-15 | Paper |
Secure two-party computation with low communication Theory of Cryptography | 2012-06-15 | Paper |
Leakage-resilient cryptography from the inner-product extractor Lecture Notes in Computer Science | 2011-12-02 | Paper |
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience Automata, Languages and Programming | 2011-07-06 | Paper |
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Leakage-resilient signatures Theory of Cryptography | 2010-02-24 | Paper |
Efficient Negative Databases from Cryptographic Hash Functions Lecture Notes in Computer Science | 2008-06-24 | Paper |
Efficient Simultaneous Broadcast Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |