| Publication | Date of Publication | Type |
|---|
| Individual cryptography | 2024-02-02 | Paper |
| Trojan-resilience without cryptography | 2023-04-13 | Paper |
| Reverse firewalls for actively secure MPCs | 2022-11-09 | Paper |
| Simple refreshing in the noisy leakage model | 2020-05-11 | Paper |
| Multi-party virtual state channels | 2020-02-04 | Paper |
| Unifying leakage models: from probing attacks to noisy leakage | 2019-01-29 | Paper |
| Non-Malleable Codes | 2018-12-06 | Paper |
| Quasi chain rule for min-entropy | 2018-04-04 | Paper |
| Position-based cryptography and multiparty communication complexity | 2018-01-19 | Paper |
| Bounded-Retrieval Model with Keys Derived from Private Data | 2017-05-05 | Paper |
| Towards Sound Fresh Re-keying with Hard (Physical) Learning Problems | 2016-10-27 | Paper |
| Circuit Compilers with $$O(1/\log (n))$$ O ( 1 / log ( n ) ) Leakage Rate | 2016-07-15 | Paper |
| Optimal Amplification of Noisy Leakages | 2016-04-08 | Paper |
| Efficient Leakage Resilient Circuit Compilers | 2016-03-02 | Paper |
| PoW-Based Distributed Cryptography with No Trusted Setup | 2015-12-10 | Paper |
| Proofs of Space | 2015-12-10 | Paper |
| One-Time Programs with Limited Memory | 2015-12-02 | Paper |
| Leakage Resilience of the Blom’s Key Distribution Scheme | 2015-09-30 | Paper |
| Noisy Leakage Revisited | 2015-09-30 | Paper |
| Modeling Bitcoin Contracts by Timed Automata | 2015-08-06 | Paper |
| Leakage-Resilient Non-malleable Codes | 2015-07-06 | Paper |
| On the complexity of verifiable secret sharing and multiparty computation | 2014-09-26 | Paper |
| Position-Based Cryptography from Noisy Channels | 2014-06-24 | Paper |
| Unifying Leakage Models: From Probing Attacks to Noisy Leakage. | 2014-05-27 | Paper |
| Non-malleable Codes from Two-Source Extractors | 2013-09-17 | Paper |
| Leakage-Resilient Circuits without Computational Assumptions | 2012-06-15 | Paper |
| Leakage-Resilient Cryptography from the Inner-Product Extractor | 2011-12-02 | Paper |
| Key-Evolution Schemes Resilient to Space-Bounded Leakage | 2011-08-12 | Paper |
| One-Time Computable Self-erasing Functions | 2011-05-19 | Paper |
| A Lower Bound on the Key Length of Information-Theoretic Forward-Secure Storage Schemes | 2010-09-29 | Paper |
| Leakage-Resilient Storage | 2010-09-10 | Paper |
| How to Pair with a Human | 2010-09-10 | Paper |
| Tight security proofs for the bounded-storage model | 2010-08-05 | Paper |
| On Active Attacks on Sensor Network Key Distribution Schemes | 2010-01-05 | Paper |
| The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement | 2009-02-24 | Paper |
| Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
| On Forward-Secure Storage | 2007-09-04 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Adaptive versus non-adaptive security of multi-party protocols | 2004-10-01 | Paper |
| Optimal randomizer efficiency in the bounded-storage model | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778854 | 2002-03-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250770 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4362912 | 1998-06-11 | Paper |