1. Public-key encryption resistant to parameter subversion and its realization from efficiently-embeddable groups;Auerbach,2018
2. Verifiable random functions: relations to identity-based key encapsulation and new constructions;Abdalla;J. Cryptol.,2014
3. On the impossibility of cryptography with tamperable randomness;Austrin,2014
4. Non-malleable codes from additive combinatorics;Aggarwal,2014
5. Leakage-resilient public-key cryptography in the bounded-retrieval model;Alwen,2009