| Publication | Date of Publication | Type |
|---|
| Multi-stage proof-of-works: properties and vulnerabilities | 2023-10-17 | Paper |
| Probabilistic secret sharing | 2021-08-04 | Paper |
| Secret sharing schemes for infinite sets of participants: a new design technique | 2021-02-15 | Paper |
| Security of public-key cryptosystems based on Chebyshev polynomials | 2017-11-20 | Paper |
| Private set intersection: new generic constructions and feasibility results | 2017-10-12 | Paper |
| Secure computation without computers | 2017-03-16 | Paper |
| Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography | 2017-01-06 | Paper |
| All or nothing at all | 2016-12-06 | Paper |
| Secure Two-Party Computation: A Visual Way | 2015-09-30 | Paper |
| Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes | 2015-09-30 | Paper |
| Anonymous protocols: notions and equivalence | 2015-05-22 | Paper |
| Size-Hiding in Private Set Intersection: Existential Results and Constructions | 2012-07-23 | Paper |
| Fighting Pirates 2.0 | 2011-06-28 | Paper |
| Theoretical Computer Science | 2010-02-23 | Paper |
| Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation | 2009-12-03 | Paper |
| Variations on a theme by Akl and Taylor: security and tradeoffs | 2009-12-01 | Paper |
| Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants | 2009-10-16 | Paper |
| Foundations of Security Analysis and Design II | 2009-05-14 | Paper |
| On Self-Healing Key Distribution Schemes | 2008-12-21 | Paper |
| Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol | 2008-06-13 | Paper |
| On unconditionally secure distributed oblivious transfer | 2007-08-20 | Paper |
| Analysis and design of distributed key distribution centers | 2006-08-14 | Paper |
| Properties and constraints of cheating-immune secret sharing schemes | 2006-04-28 | Paper |
| Automata, Languages and Programming | 2005-08-24 | Paper |
| Design of self-healing key distribution schemes | 2004-08-16 | Paper |
| Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures | 2004-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4736424 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4448376 | 2004-02-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4448383 | 2004-02-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4448387 | 2004-02-18 | Paper |
| Contrast Optimal Threshold Visual Cryptography Schemes | 2004-01-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418542 | 2003-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413869 | 2003-07-21 | Paper |
| On Unconditionally Secure Robust Distributed Key Distribution Centers | 2003-07-16 | Paper |
| A ramp model for distributed key distribution schemes | 2003-06-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2741394 | 2001-10-14 | Paper |
| A t-private k-database information retrieval scheme | 2001-01-01 | Paper |
| A -restricted key agreement scheme | 1999-09-22 | Paper |