| Publication | Date of Publication | Type |
|---|
| Functional commitments for all functions, with transparent setup and from SIS | 2023-12-12 | Paper |
| Classical and quantum security of elliptic curve VRF, via relative indifferentiability | 2023-10-04 | Paper |
| Vector and functional commitments from lattices | 2023-04-13 | Paper |
| Constraining and Watermarking PRFs from Milder Assumptions | 2022-10-13 | Paper |
| Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography | 2022-10-13 | Paper |
| Hardness of bounded distance decoding on lattices in lp norms | 2022-07-21 | Paper |
| He gives C-sieves on the CSIDH | 2022-03-23 | Paper |
| Lattice (List) Decoding Near Minkowski’s Inequality | 2022-02-17 | Paper |
| Outsourcing computation: the minimal refereed mechanism | 2020-06-30 | Paper |
| Noninteractive zero knowledge for NP from (Plain) Learning With Errors | 2020-05-20 | Paper |
| Algebraically structured LWE. Revisited | 2020-04-30 | Paper |
| More efficient commitments from structured lattice assumptions | 2018-10-17 | Paper |
| New (and old) proof systems for lattice problems | 2018-05-29 | Paper |
| Privately constraining and programming PRFs, the LWE way | 2018-05-29 | Paper |
| List-decoding Barnes-Wall lattices | 2017-10-18 | Paper |
| Pseudorandomness of ring-LWE for any ring and modulus | 2017-08-17 | Paper |
| Optimal Error Correction for Computationally Bounded Noise | 2017-07-27 | Paper |
| Multi-key FHE from LWE, Revisited | 2016-12-22 | Paper |
| Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE | 2016-10-27 | Paper |
| On Adaptively Secure Multiparty Computation with a Short CRS | 2016-10-21 | Paper |
| How (Not) to Instantiate Ring-LWE | 2016-10-21 | Paper |
| Recovering Short Generators of Principal Ideals in Cyclotomic Rings | 2016-07-15 | Paper |
| A Decade of Lattice Cryptography | 2016-05-23 | Paper |
| SPRING: Fast Pseudorandom Functions from Rounded Ring Products | 2015-09-18 | Paper |
| Completely fair SFE and coalition-safe cheap talk | 2015-08-03 | Paper |
| Key-Homomorphic Constrained Pseudorandom Functions | 2015-07-06 | Paper |
| Public-key cryptosystems from the worst-case shortest vector problem | 2015-02-04 | Paper |
| Lattice Cryptography for the Internet | 2015-01-14 | Paper |
| Faster Bootstrapping with Polynomial Error | 2014-08-07 | Paper |
| New and Improved Key-Homomorphic Pseudorandom Functions | 2014-08-07 | Paper |
| Classical hardness of learning with errors | 2014-08-07 | Paper |
| Enumerative Lattice Algorithms in any Norm Via M-ellipsoid Coverings | 2014-07-30 | Paper |
| On Ideal Lattices and Learning with Errors over Rings | 2014-02-17 | Paper |
| How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE | 2014-01-24 | Paper |
| Practical Bootstrapping in Quasilinear Time | 2013-09-02 | Paper |
| Hardness of SIS and LWE with Small Parameters | 2013-09-02 | Paper |
| A Toolkit for Ring-LWE Cryptography | 2013-05-31 | Paper |
| Bonsai trees, or how to delegate a lattice basis | 2013-01-04 | Paper |
| Ring Switching in BGV-Style Homomorphic Encryption | 2012-09-25 | Paper |
| Circular and KDM Security for Identity-Based Encryption | 2012-07-20 | Paper |
| Identity-Based (Lossy) Trapdoor Functions and Applications | 2012-06-29 | Paper |
| Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller | 2012-06-29 | Paper |
| Pseudorandom Functions and Lattices | 2012-06-29 | Paper |
| Generating Shorter Bases for Hard Random Lattices | 2012-04-24 | Paper |
| Lossy Trapdoor Functions and Their Applications | 2012-03-15 | Paper |
| Bi-Deniable Public-Key Encryption | 2011-08-12 | Paper |
| Generating shorter bases for hard random lattices | 2011-05-23 | Paper |
| Better Key Sizes (and Attacks) for LWE-Based Encryption | 2011-02-11 | Paper |
| An Efficient and Parallel Gaussian Sampler for Lattices | 2010-08-24 | Paper |
| On Ideal Lattices and Learning with Errors over Rings | 2010-06-01 | Paper |
| Bonsai Trees, or How to Delegate a Lattice Basis | 2010-06-01 | Paper |
| Public-Key Encryption Schemes with Auxiliary Inputs | 2010-02-24 | Paper |
| Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems | 2009-10-20 | Paper |
| Some Recent Progress in Lattice-Based Cryptography | 2009-03-03 | Paper |
| Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems | 2009-02-10 | Paper |
| A Framework for Efficient and Composable Oblivious Transfer | 2009-02-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3549647 | 2009-01-05 | Paper |
| Lossy trapdoor functions and their applications | 2009-01-05 | Paper |
| Trapdoors for hard lattices and new cryptographic constructions | 2009-01-05 | Paper |
| SWIFFT: A Modest Proposal for FFT Hashing | 2008-09-18 | Paper |
| Limits on the hardness of lattice problems in \(\ell_{p}\) norms | 2008-08-20 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474183 | 2004-08-04 | Paper |