| Publication | Date of Publication | Type |
|---|
| State machine replication under changing network conditions | 2023-08-25 | Paper |
| An analysis of the algebraic group model | 2023-08-21 | Paper |
| Subset predicate encryption and its applications | 2023-08-02 | Paper |
| Boosting the Security of Blind Signature Schemes | 2023-05-26 | Paper |
| \textsc{Tardigrade}: an atomic broadcast protocol for arbitrary network conditions | 2023-05-12 | Paper |
| Algebraic adversaries in the universal composability framework | 2023-05-12 | Paper |
| Efficient 3-party distributed ORAM | 2022-12-16 | Paper |
| Universally composable relaxed password authenticated key exchange | 2022-11-09 | Paper |
| Spreading the privacy blanket: differentially oblivious shuffling for differential privacy | 2022-11-09 | Paper |
| Efficient, Reusable Fuzzy Extractors from LWE | 2022-06-15 | Paper |
| On the security of time-lock puzzles and timed commitments | 2022-03-23 | Paper |
| Asynchronous Byzantine agreement with subquadratic communication | 2021-12-01 | Paper |
| Introduction to Modern Cryptography | 2020-11-16 | Paper |
| Optimizing authenticated garbling for faster secure two-party computation | 2020-06-30 | Paper |
| Synchronous consensus with optimal asynchronous fallback guarantees | 2020-04-30 | Paper |
| Feasibility and infeasibility of secure computation with malicious PUFs | 2020-04-28 | Paper |
| Constant-round group key exchange from the Ring-LWE assumption | 2020-02-25 | Paper |
| Covert security with public verifiability: faster, leaner, and simpler | 2020-02-04 | Paper |
| (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens | 2019-06-20 | Paper |
| Simple and efficient two-server ORAM | 2019-01-23 | Paper |
| More is less: perfectly secure oblivious algorithms in the multi-server setting | 2019-01-23 | Paper |
| Provable security of (tweakable) block ciphers based on substitution-permutation networks | 2018-09-12 | Paper |
| Faster Secure Two-Party Computation in the Single-Execution Setting | 2017-06-23 | Paper |
| Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited | 2017-06-13 | Paper |
| Selective-Opening Security in the Presence of Randomness Failures | 2017-01-06 | Paper |
| A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation | 2016-10-21 | Paper |
| 10-Round Feistel is Indifferentiable from an Ideal Cipher | 2016-07-15 | Paper |
| How Fair is Your Protocol? | 2016-03-23 | Paper |
| Hash Functions from Defective Ideal Ciphers | 2016-03-02 | Paper |
| Efficient and secure authenticated key exchange using weak passwords | 2015-12-07 | Paper |
| Adaptively secure broadcast, revisited | 2015-09-11 | Paper |
| Distributing the setup in universally composable multi-party computation | 2015-09-03 | Paper |
| Multi-Client Verifiable Computation with Stronger Security Guarantees | 2015-07-06 | Paper |
| Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds | 2015-07-06 | Paper |
| Reliable broadcast in radio networks | 2015-03-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3191615 | 2014-10-06 | Paper |
| On the efficiency of local decoding procedures for error-correcting codes | 2014-09-26 | Paper |
| Complete characterization of security notions for probabilistic private-key encryption | 2014-09-26 | Paper |
| Feasibility and Infeasibility of Secure Computation with Malicious PUFs | 2014-08-07 | Paper |
| Amortizing Garbled Circuits | 2014-08-07 | Paper |
| Efficient Three-Party Computation from Cut-and-Choose | 2014-08-07 | Paper |
| Multi-input Functional Encryption | 2014-05-27 | Paper |
| Verifiable Oblivious Storage | 2014-03-25 | Paper |
| (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens | 2014-02-18 | Paper |
| Complete Fairness in Secure Two-Party Computation | 2014-02-17 | Paper |
| Authenticated broadcast with a partially compromised public-key infrastructure | 2014-02-11 | Paper |
| One-round multi-party communication complexity of distinguishing sums | 2014-01-10 | Paper |
| Functional Encryption from (Small) Hardware Tokens | 2013-12-10 | Paper |
| Round-optimal password-based authenticated key exchange | 2013-11-15 | Paper |
| Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose | 2013-09-17 | Paper |
| Predicate encryption supporting disjunctions, polynomial equations, and inner products | 2013-06-27 | Paper |
| Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption | 2013-04-19 | Paper |
| Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS | 2013-04-19 | Paper |
| Feasibility and Completeness of Cryptographic Tasks in the Quantum World | 2013-03-18 | Paper |
| Universally Composable Synchronous Computation | 2013-03-18 | Paper |
| Multi-Client Non-interactive Verifiable Computation | 2013-03-18 | Paper |
| Byzantine Agreement with a Rational Adversary | 2012-11-01 | Paper |
| Collusion-Preserving Computation | 2012-09-25 | Paper |
| Constant-Round Multi-party Private Set Union Using Reversed Laurent Series | 2012-07-20 | Paper |
| Fair Computation with Rational Players | 2012-06-29 | Paper |
| On the Security of the “Free-XOR” Technique | 2012-06-15 | Paper |
| Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces | 2012-06-08 | Paper |
| Partial fairness in secure two-party computation | 2012-05-23 | Paper |
| Which languages have 4-round zero-knowledge proofs? | 2012-05-23 | Paper |
| Two-server password-only authenticated key exchange | 2012-05-11 | Paper |
| Constant-Round Private Function Evaluation with Linear Complexity | 2011-12-02 | Paper |
| Round-Optimal Password-Based Authenticated Key Exchange | 2011-05-19 | Paper |
| Limits of Computational Differential Privacy in the Client/Server Setting | 2011-05-19 | Paper |
| Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions | 2011-05-19 | Paper |
| Impossibility of Blind Signatures from One-Way Permutations | 2011-05-19 | Paper |
| On Achieving the “Best of Both Worlds” in Secure Multiparty Computation | 2011-05-17 | Paper |
| A Group Signature Scheme from Lattice Assumptions | 2010-12-07 | Paper |
| Lower bounds on the efficiency of encryption and digital signature schemes | 2010-08-16 | Paper |
| Partial Fairness in Secure Two-Party Computation | 2010-06-01 | Paper |
| Secure Network Coding over the Integers | 2010-05-28 | Paper |
| Bounds on the efficiency of black-box commitment schemes | 2010-03-10 | Paper |
| Efficient Rational Secret Sharing in Standard Communication Networks | 2010-02-24 | Paper |
| On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations | 2009-12-15 | Paper |
| Proofs of Storage from Homomorphic Identification Protocols | 2009-12-15 | Paper |
| Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices | 2009-12-15 | Paper |
| Signature Schemes with Bounded Leakage Resilience | 2009-12-15 | Paper |
| Collusion-Free Multiparty Computation in the Mediated Model | 2009-10-20 | Paper |
| Improving the round complexity of VSS in point-to-point networks | 2009-07-15 | Paper |
| Ring signatures: Stronger definitions, and constructions without random oracles | 2009-06-30 | Paper |
| Reducing complexity assumptions for statistically-hiding commitment | 2009-06-30 | Paper |
| Handling expected polynomial-time strategies in simulation-based security proofs | 2009-06-08 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Signing a Linear Subspace: Signature Schemes for Network Coding | 2009-03-24 | Paper |
| On expected constant-round protocols for Byzantine agreement | 2009-03-11 | Paper |
| Universally-Composable Two-Party Computation in Two Rounds | 2009-03-10 | Paper |
| Complete Fairness in Multi-party Computation without an Honest Majority | 2009-03-03 | Paper |
| Digital Signatures | 2009-02-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3549592 | 2009-01-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3549726 | 2009-01-05 | Paper |
| Rational Secret Sharing, Revisited | 2008-11-27 | Paper |
| How to Encrypt with a Malicious Random Number Generator | 2008-09-18 | Paper |
| Improving the Round Complexity of VSS in Point-to-Point Networks | 2008-08-19 | Paper |
| Reducing Complexity Assumptions for Statistically-Hiding Commitment | 2008-05-06 | Paper |
| Universally Composable Password-Based Key Exchange | 2008-05-06 | Paper |
| Aggregate Message Authentication Codes | 2008-04-24 | Paper |
| Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products | 2008-04-15 | Paper |
| Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise | 2008-03-07 | Paper |
| Which Languages Have 4-Round Zero-Knowledge Proofs? | 2008-03-05 | Paper |
| Universally Composable Multi-party Computation with an Unreliable Common Reference String | 2008-03-05 | Paper |
| Bridging Game Theory and Cryptography: Recent Results and Future Directions | 2008-03-05 | Paper |
| Efficient signature schemes with tight reductions to the Diffie-Hellman problems | 2007-12-06 | Paper |
| Universally Composable Multi-party Computation Using Tamper-Proof Hardware | 2007-11-29 | Paper |
| Round-Efficient Secure Computation in Point-to-Point Networks | 2007-11-29 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Chosen‐Ciphertext Security from Identity‐Based Encryption | 2007-10-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5310362 | 2007-10-11 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| Parallel and Concurrent Security of the HB and HB + Protocols | 2007-09-24 | Paper |
| Two-Server Password-Only Authenticated Key Exchange | 2007-09-24 | Paper |
| On Expected Constant-Round Protocols for Byzantine Agreement | 2007-09-04 | Paper |
| Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions | 2007-08-30 | Paper |
| A forward-secure public-key encryption scheme | 2007-08-20 | Paper |
| Scalable protocols for authenticated group key exchange | 2007-05-24 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Characterization of security notions for probabilistic private-key encryption | 2006-08-14 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Bounds on the Efficiency of Generic Cryptographic Constructions | 2005-10-28 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Incremental Unforgeable Encryption | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737236 | 2004-08-11 | Paper |
| The mathematics and statistics of voting power | 2004-03-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434877 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434880 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418524 | 2003-08-10 | Paper |
| Poststratification Without Population Level Information on the Poststratifying Variable With Application to Political Polling | 2003-08-07 | Paper |
| Strong Key-Insulated Signature Schemes | 2003-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414266 | 2003-07-24 | Paper |
| Threshold Cryptosystems Based on Factoring | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408421 | 2003-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149675 | 2002-09-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536198 | 2002-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778842 | 2002-03-21 | Paper |