| Publication | Date of Publication | Type |
|---|
| Almost tight multi-user security under adaptive corruptions from LWE in the standard model | 2024-02-06 | Paper |
| Almost tight multi-user security under adaptive corruptions \& leakages in the standard model | 2023-12-12 | Paper |
| EKE meets tight security in the universally composable framework | 2023-11-24 | Paper |
| Functional encryption against probabilistic queries: definition, construction and applications | 2023-11-16 | Paper |
| Fine-grained verifier NIZK and its applications | 2023-11-16 | Paper |
| A universally composable non-interactive aggregate cash system | 2023-08-25 | Paper |
| Privacy-preserving authenticated key exchange in the standard model | 2023-08-25 | Paper |
| Practical multi-party private set intersection cardinality and intersection-sum under arbitrary collusion | 2023-08-21 | Paper |
| Further cryptanalysis of a type of RSA variants | 2023-08-04 | Paper |
| Fuzzy authenticated key exchange with tight security | 2023-07-28 | Paper |
| More efficient verifiable functional encryption | 2023-07-21 | Paper |
| Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness | 2023-05-12 | Paper |
| Simulatable verifiable random function from the LWE assumption | 2023-04-27 | Paper |
| Two-pass authenticated key exchange with explicit authentication and tight security | 2023-03-21 | Paper |
| A New General Method of Searching for Cubes in Cube Attacks | 2022-12-21 | Paper |
| Precise bounded-concurrent zero-knowledge proofs for NP | 2022-10-28 | Paper |
| SymSem: Symbolic Execution with Time Stamps for Deobfuscation | 2022-10-14 | Paper |
| Public-Key Puncturable Encryption: Modular and Compact Constructions | 2022-10-13 | Paper |
| Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting | 2022-04-22 | Paper |
| Tightly CCA-secure inner product functional encryption scheme | 2021-12-01 | Paper |
| New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries | 2021-11-25 | Paper |
| Pseudorandom functions in NC class from the standard LWE assumption | 2021-11-11 | Paper |
| Tightly secure chameleon hash functions in the multi-user setting and their applications | 2021-06-08 | Paper |
| Robustly reusable fuzzy extractor with imperfect randomness | 2021-05-10 | Paper |
| RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security | 2021-02-08 | Paper |
| Pseudorandom functions from LWE: RKA security and application | 2020-05-27 | Paper |
| Tight leakage-resilient CCA-security from quasi-adaptive hash proof system | 2020-03-09 | Paper |
| Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman | 2020-02-07 | Paper |
| Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
| Generic constructions of robustly reusable fuzzy extractor | 2020-01-28 | Paper |
| Structure-preserving public-key encryption with leakage-resilient CCA security | 2019-10-18 | Paper |
| Tightly secure signature schemes from the LWE and subset sum assumptions | 2019-10-18 | Paper |
| A generic construction of tightly secure signatures in the multi-user setting | 2019-05-29 | Paper |
| Beyond-birthday secure domain-preserving PRFs from a single permutation | 2019-05-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4645675 | 2019-01-10 | Paper |
| On the robustness of learning parity with noise | 2018-10-26 | Paper |
| Tightly SIM-SO-CCA secure public key encryption from standard assumptions | 2018-05-16 | Paper |
| A modified fuzzy fingerprint vault based on pair-polar minutiae structures | 2018-04-20 | Paper |
| Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness | 2018-04-06 | Paper |
| Evaluation and improvement of generic-emulating DPA attacks | 2018-02-14 | Paper |
| Efficient fuzzy extraction of PUF-induced secrets: theory and applications | 2018-02-14 | Paper |
| Functional graph revisited: updates on (second) preimage attacks on hash combiners | 2017-11-15 | Paper |
| Public key encryption resilient to leakage and tampering attacks | 2017-09-07 | Paper |
| Tightly-secure signatures from the decisional composite residuosity assumption | 2017-08-25 | Paper |
| Learning $$AC^0$$ Under k-Dependent Distributions | 2017-05-19 | Paper |
| Ridge-Based Profiled Differential Power Analysis | 2017-04-12 | Paper |
| How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers | 2017-02-01 | Paper |
| Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions | 2016-09-02 | Paper |
| Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits | 2016-09-02 | Paper |
| Differential power analysis of stream ciphers with LFSRs | 2016-07-06 | Paper |
| (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond | 2015-12-10 | Paper |
| Automatic Detection and Analysis of Encrypted Messages in Malware | 2015-12-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3448009 | 2015-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3448010 | 2015-10-28 | Paper |
| Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? | 2015-07-21 | Paper |
| The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions | 2015-07-06 | Paper |
| Efficient Leakage-Resilient Identity-Based Encryption with CCA Security | 2014-02-18 | Paper |
| Improved Impossible Differential Attacks on Large-Block Rijndael | 2013-06-04 | Paper |
| New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia | 2013-01-08 | Paper |
| Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming | 2013-01-07 | Paper |
| On weaknesses of the HDCP authentication and key exchange protocol and its repair | 2012-08-24 | Paper |
| Impossible Differential Attacks on Reduced-Round LBlock | 2012-06-29 | Paper |
| Provably secure three-party password-based authenticated key exchange protocol | 2012-06-08 | Paper |
| Efficient Pairing Computation on Elliptic Curves in Hessian Form | 2011-10-27 | Paper |
| Precise Time and Space Simulatable Zero-Knowledge | 2011-09-16 | Paper |
| On Obfuscating Programs with Tamper-proof Hardware | 2011-07-29 | Paper |
| A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption | 2011-07-01 | Paper |
| A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware | 2011-05-19 | Paper |
| HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES | 2011-01-19 | Paper |
| Precise zero-knowledge arguments with poly-logarithmic efficiency | 2011-01-05 | Paper |
| On sequential composition of precise zero-knowledge | 2011-01-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3064579 | 2010-12-22 | Paper |
| Differential-Multiple Linear Cryptanalysis | 2010-11-23 | Paper |
| Fully CCA2 secure identity based broadcast encryption without random oracles | 2010-08-16 | Paper |
| A program understanding approach for stripped binary code | 2010-03-06 | Paper |
| Efficient scalar multiplication for elliptic curves over binary fields | 2010-02-12 | Paper |
| Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication∗ | 2009-11-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3641432 | 2009-11-11 | Paper |
| A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor | 2009-02-10 | Paper |
| Secure Hierarchical Identity Based Encryption Scheme in the Standard Model | 2009-01-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3524685 | 2008-09-12 | Paper |
| An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security | 2008-06-10 | Paper |
| Ono invariants of imaginary quadratic fields with class number three | 2008-02-04 | Paper |
| Further analysis of block ciphers against timing attacks | 2007-06-01 | Paper |
| Formalization of fault analysis and a new approach of fault detection | 2007-05-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3412630 | 2007-01-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5469712 | 2006-05-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700996 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5696658 | 2005-10-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823985 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408433 | 2003-06-29 | Paper |