| Publication | Date of Publication | Type |
|---|
| https://portal.mardi4nfdi.de/entity/Q6126252 | 2024-04-09 | Paper |
| Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge) | 2024-02-06 | Paper |
| Round-optimal black-box MPC in the plain model | 2024-02-02 | Paper |
| Reusable secure computation in the plain model | 2024-02-02 | Paper |
| A framework for statistically sender private OT with optimal rate | 2024-02-02 | Paper |
| Black-box reusable NISC with random oracles | 2023-12-08 | Paper |
| Round-optimal black-box secure computation from two-round malicious OT | 2023-08-14 | Paper |
| Fully-secure MPC with minimal trust | 2023-08-14 | Paper |
| Two-round Multiparty Secure Computation from Minimal Assumptions | 2023-04-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5875778 | 2023-02-03 | Paper |
| Nearly optimal robust secret sharing against rushing adversaries | 2022-12-07 | Paper |
| Round-optimal black-box protocol compilers | 2022-08-30 | Paper |
| SNARGs for P from sub-exponential DDH and QR | 2022-08-30 | Paper |
| Reusable Two-Round MPC from LPN | 2022-07-08 | Paper |
| Efficiently Obfuscating Re-Encryption Program Under DDH Assumption | 2022-07-01 | Paper |
| Three-round secure multiparty computation from black-box two-round oblivious transfer | 2022-04-22 | Paper |
| On the round complexity of black-box secure MPC | 2022-04-22 | Paper |
| Improved computational extractors and their applications | 2022-04-22 | Paper |
| Traceable secret sharing and applications | 2022-04-22 | Paper |
| Correction to: ``Unconditionally secure computation against low-complexity leakage | 2022-03-03 | Paper |
| Multi-source non-malleable extractors and applications | 2021-12-08 | Paper |
| Correction to: ``Unconditionally secure computation against low-complexity leakage | 2021-11-24 | Paper |
| Unconditionally secure computation against low-complexity leakage | 2021-09-10 | Paper |
| Two-round multiparty secure computation minimizing public key operations | 2020-06-30 | Paper |
| Adaptive garbled RAM from laconic oblivious transfer | 2020-06-30 | Paper |
| Leakage resilient secret sharing and applications | 2020-03-09 | Paper |
| Unconditionally secure computation against low-complexity leakage | 2020-03-09 | Paper |
| Revisiting non-malleable secret sharing | 2020-02-04 | Paper |
| Two-round MPC: information-theoretic and black-box | 2018-12-11 | Paper |
| Round optimal black-box ``commit-and-prove | 2018-12-11 | Paper |
| A simple construction of iO for Turing machines | 2018-12-06 | Paper |
| Two-round multiparty secure computation from minimal assumptions | 2018-07-09 | Paper |
| Adaptively secure garbling with near optimal online complexity | 2018-07-09 | Paper |
| Breaking the Sub-Exponential Barrier in Obfustopia | 2017-06-23 | Paper |
| Secure Obfuscation in a Weak Multilinear Map Model | 2016-12-22 | Paper |
| Single-Key to Multi-Key Functional Encryption with Polynomial Loss | 2016-12-22 | Paper |
| Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium | 2016-10-27 | Paper |