| Publication | Date of Publication | Type |
|---|
| Best of both worlds. Revisiting the spymasters double agent problem | 2024-02-02 | Paper |
| Private polynomial commitments and applications to MPC | 2023-11-16 | Paper |
| Ligero: lightweight sublinear arguments without a trusted setup | 2023-11-07 | Paper |
| Putting the online phase on a diet: covert security from short MACs | 2023-10-04 | Paper |
| SCALES. MPC with small clients and larger ephemeral servers | 2023-08-14 | Paper |
| On black-box constructions of time and space efficient sublinear arguments from symmetric-key primitives | 2023-08-14 | Paper |
| Financially backed covert security | 2023-08-10 | Paper |
| Actively secure garbled circuits with constant communication overhead in the plain model | 2023-07-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6107255 | 2023-07-03 | Paper |
| Multi-clients verifiable computation via conditional disclosure of secrets | 2022-12-16 | Paper |
| Gradual GRAM and secure computation for RAM programs | 2022-12-16 | Paper |
| Asymptotically quasi-optimal cryptography | 2022-08-30 | Paper |
| ZK-PCPs from leakage-resilient secret sharing | 2022-08-01 | Paper |
| TinyKeys: a new approach to efficient multi-party computation | 2022-04-11 | Paper |
| The price of active security in cryptographic protocols | 2022-03-23 | Paper |
| Generic compiler for publicly verifiable covert multi-party computation | 2021-12-08 | Paper |
| Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions? | 2021-12-01 | Paper |
| Going beyond dual execution: MPC for functions with efficient verification | 2021-12-01 | Paper |
| Round-optimal secure multi-party computation | 2021-07-30 | Paper |
| Low cost constant round MPC combining BMR and oblivious transfer | 2020-11-06 | Paper |
| TinyKeys: a new approach to efficient multi-party computation | 2020-06-30 | Paper |
| On the power of secure two-party computation | 2020-03-03 | Paper |
| Constant-round maliciously secure two-party computation in the RAM model | 2019-11-27 | Paper |
| What security can we achieve within 4 rounds? | 2019-11-27 | Paper |
| On black-box complexity of universally composable security in the CRS model | 2019-08-13 | Paper |
| Efficient RSA key generation and threshold Paillier in the two-party setting | 2019-06-20 | Paper |
| Concretely efficient large-scale MPC with active security (or tinykeys for tinyot) | 2019-01-23 | Paper |
| Round-optimal fully black-box zero-knowledge arguments from one-way permutations | 2018-12-11 | Paper |
| Two-Dimensional Parameterized Matching | 2018-10-30 | Paper |
| Round-optimal secure multi-party computation | 2018-09-26 | Paper |
| Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs | 2018-05-28 | Paper |
| Low cost constant round MPC combining BMR and oblivious transfer | 2018-04-06 | Paper |
| Actively secure garbled circuits with constant communication overhead in the plain model | 2018-01-19 | Paper |
| Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model | 2017-06-13 | Paper |
| Scalable Multi-party Private Set-Intersection | 2017-06-13 | Paper |
| On Compression of Data Encrypted With Block Ciphers | 2017-06-08 | Paper |
| Efficient one-sided adaptively secure computation | 2017-03-02 | Paper |
| Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity | 2016-12-21 | Paper |
| Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions | 2016-12-21 | Paper |
| Constant-Round Maliciously Secure Two-Party Computation in the RAM Model | 2016-12-21 | Paper |
| On the Power of Secure Two-Party Computation | 2016-10-27 | Paper |
| The Feasibility of Outsourced Database Search in the Plain Model | 2016-10-21 | Paper |
| What Security Can We Achieve Within 4 Rounds? | 2016-10-21 | Paper |
| Toward a game theoretic view of secure computation | 2016-10-13 | Paper |
| Leakage-resilient cryptography from minimal assumptions | 2016-09-21 | Paper |
| Selective Opening Security for Receivers | 2016-06-10 | Paper |
| Automata evaluation and text search protocols with simulation-based security | 2016-06-01 | Paper |
| Signature schemes secure against hard-to-invert leakage | 2016-06-01 | Paper |
| Efficient set intersection with simulation-based security | 2016-04-07 | Paper |
| On Black-Box Complexity of Universally Composable Security in the CRS Model | 2016-03-23 | Paper |
| Adaptively Secure Computation with Partial Erasures | 2016-03-23 | Paper |
| Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs | 2015-07-06 | Paper |
| Distributed public key schemes secure against continual leakage | 2014-12-05 | Paper |
| Computationally secure pattern matching in the presence of malicious adversaries | 2014-09-25 | Paper |
| One-Sided Adaptively Secure Two-Party Computation | 2014-02-18 | Paper |
| Complete Fairness in Secure Two-Party Computation | 2014-02-17 | Paper |
| Outsourced Pattern Matching | 2013-08-07 | Paper |
| Leakage-Resilient Cryptography from Minimal Assumptions | 2013-05-31 | Paper |
| Signature Schemes Secure against Hard-to-Invert Leakage | 2013-03-19 | Paper |
| Efficient set operations in the presence of malicious adversaries | 2012-07-10 | Paper |
| Secure Two-Party Computation with Low Communication | 2012-06-15 | Paper |
| Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting | 2012-06-08 | Paper |
| Towards a Game Theoretic View of Secure Computation | 2011-05-27 | Paper |
| Computationally Secure Pattern Matching in the Presence of Malicious Adversaries | 2010-12-07 | Paper |
| Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries | 2010-09-21 | Paper |
| Approximate parameterized matching | 2010-08-14 | Paper |
| Efficient secure two-party protocols. Techniques and constructions | 2010-08-03 | Paper |
| Efficient Set Operations in the Presence of Malicious Adversaries | 2010-05-28 | Paper |
| Text Search Protocols with Simulation Based Security | 2010-05-28 | Paper |
| Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries | 2008-03-05 | Paper |
| Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions | 2007-08-30 | Paper |
| Combinatorial Pattern Matching | 2005-12-14 | Paper |
| Algorithms – ESA 2004 | 2005-08-18 | Paper |