Publications

Note: the order of the papers here is according to the year of the conference in which the paper was presented.

Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs

Concurrent Composition of Secure Protocols in the Timing Model

Universally Composable Password-Based Key Exchange

Secure Computation Without Authentication

Skip to content