| Publication | Date of Publication | Type |
|---|
| Critical perspectives on provable security: fifteen years of ``another look papers | 2019-09-19 | Paper |
| On the cost of computing isogenies between supersingular elliptic curves | 2019-02-20 | Paper |
| On the security of the WOTS-PRF signature scheme | 2019-02-15 | Paper |
| On isogeny graphs of supersingular elliptic curves over finite fields | 2018-12-19 | Paper |
| Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields | 2018-11-15 | Paper |
| Another look at tightness. II: Practical issues in cryptography | 2017-10-23 | Paper |
| On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One | 2017-09-08 | Paper |
| Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields | 2017-08-08 | Paper |
| Fault Attacks on Pairing-Based Protocols: Revisited | 2017-05-16 | Paper |
| Type 2 Structure-Preserving Signature Schemes Revisited | 2016-06-10 | Paper |
| Cryptocash, cryptocurrencies, and cryptocontracts | 2016-02-02 | Paper |
| The random oracle model: a twenty-year retrospective | 2015-10-26 | Paper |
| Computing Discrete Logarithms in $${\mathbb F}_{3^{6 \cdot 137}}$$ and $${\mathbb F}_{3^{6 \cdot 163}}$$ Using Magma | 2015-10-01 | Paper |
| Another Look at Security Theorems for 1-Key Nested MACs | 2015-06-22 | Paper |
| Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography | 2015-01-30 | Paper |
| Another look at non-uniformity | 2014-05-02 | Paper |
| Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography | 2014-02-18 | Paper |
| Another look at HMAC | 2013-11-12 | Paper |
| Another look at security definitions | 2013-05-06 | Paper |
| Generalizations of Verheul's theorem to asymmetric pairings | 2013-05-06 | Paper |
| Implementing Pairings at the 192-Bit Security Level | 2013-04-04 | Paper |
| Another Look at Provable Security | 2012-06-29 | Paper |
| Another Look at Tightness | 2012-06-08 | Paper |
| Discrete logarithms, Diffie-Hellman, and reductions | 2012-03-29 | Paper |
| Parallelizing the Weil and Tate Pairings | 2011-12-16 | Paper |
| On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited | 2011-08-10 | Paper |
| A Generic Variant of NIST’s KAS2 Key Agreement Protocol | 2011-07-07 | Paper |
| Elliptic curve cryptography: the serpentine course of a paradigm shift | 2011-04-08 | Paper |
| On reusing ephemeral keys in Diffie-Hellman key agreement protocols | 2011-04-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3062282 | 2011-01-03 | Paper |
| Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols | 2010-12-07 | Paper |
| On the asymptotic effectiveness of Weil descent attacks | 2010-11-12 | Paper |
| On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings | 2010-07-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3561288 | 2010-05-25 | Paper |
| Comparing two pairing-based aggregate signature schemes | 2010-05-19 | Paper |
| A New Protocol for the Nearby Friend Problem | 2010-01-07 | Paper |
| Reusing Static Keys in Key Agreement Protocols | 2009-12-17 | Paper |
| Comparing the pre- and post-specified peer models for key agreement | 2009-05-12 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3614009 | 2009-03-16 | Paper |
| Another look at non-standard discrete log and Diffie-Hellman problems | 2009-03-03 | Paper |
| Comparing the Pre- and Post-specified Peer Models for Key Agreement | 2008-07-08 | Paper |
| On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols | 2008-04-11 | Paper |
| Another Look at “Provable Security”. II | 2008-04-11 | Paper |
| Another look at HMQV | 2008-02-21 | Paper |
| Supersingular Elliptic Curves in Cryptography | 2007-11-29 | Paper |
| Software Implementation of Arithmetic in | 2007-11-15 | Paper |
| Another look at ``provable security | 2007-05-24 | Paper |
| Another look at generic groups | 2007-04-05 | Paper |
| Formulas for cube roots in \(\mathbb F_{3^m}\) | 2007-03-02 | Paper |
| Cryptography and Coding | 2006-11-01 | Paper |
| Cryptographic implications of Hess' generalized GHS attack | 2006-09-12 | Paper |
| On the number of trace-one elements in polynomial bases for \({\mathbb F}_{2^n}\) | 2006-05-29 | Paper |
| Algebraic curves and cryptography | 2005-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4664851 | 2005-04-08 | Paper |
| A Survey of Public-Key Cryptosystems | 2005-02-25 | Paper |
| Security of signature schemes in a multi-user setting | 2005-01-17 | Paper |
| Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree | 2004-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4826108 | 2004-11-10 | Paper |
| Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem | 2004-08-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4800273 | 2003-09-30 | Paper |
| Validation of Elliptic Curve Public Keys | 2003-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4788576 | 2003-05-19 | Paper |
| An efficient protocol for authenticated key agreement | 2003-04-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2765411 | 2003-02-25 | Paper |
| The state of elliptic curve cryptography | 2002-10-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536202 | 2002-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724449 | 2002-06-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4940065 | 2000-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250828 | 2000-02-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4263430 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4387321 | 1998-11-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4718481 | 1996-12-08 | Paper |
| Reducing elliptic curve logarithms to logarithms in a finite field | 1994-10-03 | Paper |
| Counting Points on Elliptic Curves Over F 2 m | 1994-07-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279672 | 1994-05-24 | Paper |
| Elliptic curve cryptosystems and their implementation | 1994-01-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3141896 | 1993-11-01 | Paper |
| A note on cyclic groups, finite fields, and the discrete logarithm problem | 1992-12-14 | Paper |
| Subgroup Refinement Algorithms for Root Finding in $GF(q)$ | 1992-06-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3211242 | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3349031 | 1990-01-01 | Paper |
| On the Number of Self-Dual Bases of GF(q m ) Over GF(q) | 1990-01-01 | Paper |