| Publication | Date of Publication | Type |
|---|
| Adaptively Secure Single Secret Leader Election from DDH | 2024-03-26 | Paper |
| Efficient and universally composable single secret leader election from pairings | 2023-11-24 | Paper |
| Additive-homomorphic functional commitments and applications to homomorphic signatures | 2023-08-21 | Paper |
| On the impossibility of algebraic vector commitments in pairing-free groups | 2023-08-14 | Paper |
| Inner-product functional encryption with fine-grained access control | 2023-03-29 | Paper |
| Double-authentication-preventing signatures in the standard model | 2022-12-16 | Paper |
| Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security | 2022-11-17 | Paper |
| Labeled homomorphic encryption. Scalable and privacy-preserving processing of outsourced data | 2022-08-25 | Paper |
| Bandwidth-efficient threshold EC-DSA | 2021-12-01 | Paper |
| Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \) | 2021-12-01 | Paper |
| Two-party ECDSA from hash proof systems and efficient instantiations | 2020-03-09 | Paper |
| Efficient function-hiding functional encryption: from inner-products to orthogonality | 2020-01-28 | Paper |
| Verifiable pattern matching on outsourced texts | 2019-01-04 | Paper |
| Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings | 2018-09-12 | Paper |
| Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions | 2018-09-06 | Paper |
| On the security notions for homomorphic signatures | 2018-08-10 | Paper |
| Practical homomorphic message authenticators for arithmetic circuits | 2018-04-26 | Paper |
| Practical functional encryption for quadratic functions with applications to predicate encryption | 2017-11-03 | Paper |
| Zero-Knowledge Sets With Short Proofs | 2017-07-27 | Paper |
| Verifiable Pattern Matching on Outsourced Texts | 2016-10-21 | Paper |
| Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys | 2015-12-10 | Paper |
| Algebraic (trapdoor) one-way functions: constructions and applications | 2015-10-08 | Paper |
| Authenticating Computation on Groups: New Homomorphic Primitives and Applications | 2015-01-06 | Paper |
| Homomorphic Signatures and Message Authentication Codes | 2014-10-14 | Paper |
| Verifiable random functions: relations to identity-based key encapsulation and new constructions | 2014-09-25 | Paper |
| Homomorphic Signatures with Efficient Verification for Polynomial Functions | 2014-08-07 | Paper |
| Generalizing Homomorphic MACs for Arithmetic Circuits | 2014-03-25 | Paper |
| Practical Homomorphic MACs for Arithmetic Circuits | 2013-05-31 | Paper |
| Vector Commitments and Their Applications | 2013-04-19 | Paper |
| Algebraic (Trapdoor) One-Way Functions and Their Applications | 2013-03-18 | Paper |
| Efficient Network Coding Signatures in the Standard Model | 2012-07-20 | Paper |
| Adaptive Pseudo-free Groups and Applications | 2011-05-27 | Paper |
| Wildcarded identity-based encryption | 2011-04-01 | Paper |
| Coercion-Resistant Electronic Elections | 2010-06-17 | Paper |
| Advances in Cryptology - ASIACRYPT 2003 | 2010-01-05 | Paper |
| Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness | 2009-07-07 | Paper |
| Hybrid commitments and their applications to zero-knowledge proof systems | 2009-06-22 | Paper |
| Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions | 2009-06-08 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Verifiable Random Functions from Identity-Based Key Encapsulation | 2009-05-12 | Paper |
| Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework | 2008-04-24 | Paper |
| Zero-Knowledge Sets with Short Proofs | 2008-04-15 | Paper |
| Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | 2008-03-17 | Paper |
| Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results | 2008-03-05 | Paper |
| Identity-Based Encryption Gone Wild | 2007-09-11 | Paper |
| Improved On-Line/Off-Line Threshold Signatures | 2007-09-04 | Paper |
| Trapdoor hard-to-invert group isomorphisms and their application to password-based authentication | 2007-05-24 | Paper |
| Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring | 2007-02-26 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5489058 | 2006-09-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3374909 | 2006-03-01 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
| Contemporary cryptology. | 2005-08-30 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm | 2003-07-16 | Paper |
| Paillier's trapdoor function hides up to \(O(n)\) bits | 2003-03-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778852 | 2002-03-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2728905 | 2001-11-04 | Paper |
| New efficient and secure protocols for verifiable signature sharing and other applications | 2001-06-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249324 | 2000-03-09 | Paper |