| Publication | Date of Publication | Type |
|---|
| Public-key encryption from homogeneous CLWE | 2023-08-14 | Paper |
| One-Way Functions and (Im)perfect Obfuscation | 2023-04-04 | Paper |
| Acyclicity programming for sigma-protocols | 2023-03-31 | Paper |
| Cryptography from one-way communication: on completeness of finite channels | 2023-03-29 | Paper |
| Non-interactive composition of sigma-protocols via Share-then-Hash | 2023-03-29 | Paper |
| Cryptography from Information Loss. | 2023-02-03 | Paper |
| Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange | 2022-10-13 | Paper |
| PPP-Completeness and Extremal Combinatorics | 2022-09-11 | Paper |
| Time- and space-efficient arguments from groups of unknown order | 2022-05-18 | Paper |
| Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration | 2022-04-22 | Paper |
| Public-coin zero-knowledge arguments with (almost) minimal time and space overheads | 2022-03-23 | Paper |
| Pseudorandom Functions: Three Decades Later | 2022-01-12 | Paper |
| Limits on the efficiency of (ring) LWE-based non-interactive key exchange | 2021-11-24 | Paper |
| An Algebraic Approach to Nonmalleability | 2021-10-18 | Paper |
| Can PPAD hardness be based on standard cryptographic assumptions? | 2021-04-07 | Paper |
| Finding a Nash equilibrium is no easier than breaking Fiat-Shamir | 2020-01-30 | Paper |
| Securing Abe's mix-net against malicious verifiers via witness indistinguishability | 2018-10-17 | Paper |
| Proofs of Work from worst-case assumptions | 2018-09-12 | Paper |
| An efficiency-preserving transformation from honest-verifier statistical zero-knowledge to statistical zero-knowledge | 2018-07-17 | Paper |
| Functional encryption for bounded collusions, revisited | 2018-01-19 | Paper |
| Can PPAD hardness be based on standard cryptographic assumptions? | 2018-01-19 | Paper |
| Average-case fine-grained hardness | 2017-08-17 | Paper |
| Candidate weak pseudorandom functions in AC 0 ○ MOD 2 | 2017-05-19 | Paper |
| Rational arguments | 2017-05-19 | Paper |
| On the Existence of Extractable One-Way Functions | 2016-10-28 | Paper |
| A dichotomy for local small-bias generators | 2016-09-21 | Paper |
| Rational Sumchecks | 2016-04-08 | Paper |
| On the Hardness of Learning with Rounding over Small Modulus | 2016-03-23 | Paper |
| Adaptive Security with Quasi-Optimal Rate | 2016-03-23 | Paper |
| SPRING: Fast Pseudorandom Functions from Rounded Ring Products | 2015-09-18 | Paper |
| FPGA Implementations of SPRING | 2015-07-21 | Paper |
| The Power of Negations in Cryptography | 2015-07-06 | Paper |
| Non-committing Encryption from Φ-hiding | 2015-07-06 | Paper |
| Public Verification of Private Effort | 2015-07-06 | Paper |
| On the existence of extractable one-way functions | 2015-06-26 | Paper |
| Black-box concurrent zero-knowledge requires \tilde {Ω} (log n ) rounds | 2015-02-27 | Paper |
| Pseudo-random functions and factoring (extended abstract) | 2014-09-26 | Paper |
| The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator | 2014-08-07 | Paper |
| Lower Bounds in the Hardware Token Model | 2014-02-18 | Paper |
| Limits on the Power of Cryptographic Cheap Talk | 2013-09-02 | Paper |
| Public-coin parallel zero-knowledge for NP | 2013-04-15 | Paper |
| More constructions of lossy and correlation-secure trapdoor functions | 2013-04-15 | Paper |
| Input locality and hardness amplification | 2013-04-15 | Paper |
| Pseudorandom Functions and Lattices | 2012-06-29 | Paper |
| Lossy Functions Do Not Amplify Well | 2012-06-15 | Paper |
| A Dichotomy for Local Small-Bias Generators | 2012-06-15 | Paper |
| Input Locality and Hardness Amplification | 2011-05-19 | Paper |
| Chosen-Ciphertext Security via Correlated Products | 2011-04-04 | Paper |
| Optimistic Concurrent Zero Knowledge | 2010-12-07 | Paper |
| New and improved constructions of non-malleable cryptographic protocols | 2010-08-16 | Paper |
| More Constructions of Lossy and Correlation-Secure Trapdoor Functions | 2010-05-28 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| Theory of Cryptography | 2009-05-14 | Paper |
| New and Improved Constructions of Nonmalleable Cryptographic Protocols | 2009-04-30 | Paper |
| Fairness with an Honest Minority and a Rational Majority | 2009-03-03 | Paper |
| On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols | 2009-03-03 | Paper |
| Chosen-Ciphertext Security via Correlated Products | 2009-03-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3549647 | 2009-01-05 | Paper |
| Concurrent Nonmalleable Commitments | 2008-12-22 | Paper |
| SWIFFT: A Modest Proposal for FFT Hashing | 2008-09-18 | Paper |
| On Robust Combiners for Oblivious Transfer and Other Primitives | 2008-05-06 | Paper |
| Constant-round oblivious transfer in the bounded storage model | 2007-05-03 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Completeness in two-party secure computation: A computational view | 2007-01-24 | Paper |
| Concurrent zero-knowledge. With additional background by Oded Goldreich | 2006-10-27 | Paper |
| Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds | 2003-01-05 | Paper |
| Pseudorandom Functions and Factoring | 2002-09-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536818 | 2002-07-28 | Paper |