Publications
Research Interests
My interests in cryptography include blockchains, random-number generation, secure communication, symmetric primitives, public-key encryption, non-malleable codes, multi-party computation, as well as cryptocurrencies and blockchains. I've also worked in the area of quantum information in the past.
New Papers
Continuous Group Key Agreement with Active Security
with Joël Alwen, Daniel Jost, and Marta Mularczyk
In submission. IACR Cryptology ePrint Archive, 2020:752 (2020).
Hydra: Fast Isomorphic State Channels
with Manuel M. T. Chakravarty, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, and Alexander Russell
In submission. IACR Cryptology ePrint Archive, 2020:299 (2020)
Security Analysis and Improvements for the IETF MLS Standard for Group Messaging
with Joël Alwen, Yevgeniy Dodis, and Yiannis Tselekounis
To appear at CRYPTO 2020. IACR Cryptology ePrint Archive, 2019:1189 (2019)
Conference Papers
Seedless Fruit Is the Sweetest: Random-Number Generation, Revisited
with Yevgeniy Dodis, Harish Karthikeyan, and Stefano Tessaro
CRYPTO 2019. Lecture Notes in Computer Science, Springer, vol. 11692, pp. 205– 234, Aug 2019.
Rate-Optimizing Compilers for Continuously Non-Malleable Codes
with Antonio Faonio and Daniele Venturi
ACNS 2019. Lecture Notes in Computer Science, Springer, vol. 11464, pp. 3–23, June 2019.
The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol
with Joël Alwen and Yevgeniy Dodis
EUROCRYPT 2019. Lecture Notes in Computer Science, Springer, vol. 11476, pp. 129–158, May 2019.
Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models
with Yevgeniy Dodis and Siyao Guo
CRYPTO 2018. Lecture Notes in Computer Science, Springer, vol. 10991, pp. 693–721, August 2018.
Random Oracles and Non-Uniformity
with Yevgeniy Dodis, Siyao Guo, and John Steinberger
EUROCRYPT 2018, Lecture Notes in Computer Science, Springer, vol. 10820, pp. 227–258, April 2018.
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
with Ran Cohen, Juan Garay, and Vassilis Zikas
ICALP 2017, LIPIcs, vol. 80, 37:1-37:15.
Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions
with Juan Garay, Martin Hirt, and Vassilis Zikas
ASIACRYPT 2016, Lecture Notes in Computer Science, Springer, vol. 10032, pp. 998–1021, August 2016.
Probabilistic Termination and Composability of Cryptographic Protocols
with Ran Cohen, Juan Garay, and Vassilis Zikas
CRYPTO 2016, Lecture Notes in Computer Science, Springer, vol. 9816, pp. 240–269, August 2016.
Non-Malleable Encryption: Simpler, Shorter, Stronger
with Yevgeniy Dodis, Björn Tackmann, and Daniele Venturi
TCC 2016-A, Lecture Notes in Computer Science, Springer, vol. 9562, pp. 306–335, Jan 2016.
From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes
with Ueli Maurer, Björn Tackmann, and Daniele Venturi
TCC 2015, Lecture Notes in Computer Science, Springer, vol. 9014, pp. 532–560, Mar 2015.
Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited
with Ueli Maurer and Björn Tackmann
ASIACRYPT 2013, Lecture Notes in Computer Science, Springer, vol. 8269, pp. 134–153, Dec 2013.
Journal Papers
Probabilistic Termination and Composability of Cryptographic Protocols
with Ran Cohen, Juan Garay, and Vassilis Zikas
J. Cryptology, vol. 32(3), pp. 690–741, Oct 2019.
with Esther Hänggi and Stefan Wolf
Phys. Rev. Lett., American Physical Society, vol. 107, pp. 100402, Aug 2011.
Book Chapters
A Constructive Perspective on Key Encapsulation
with Ueli Maurer and Björn Tackmann
Number Theory and Cryptography, Lecture Notes in Computer Science, Springer, vol. 8260, pp. 226–239, 2013.
Manuscripts
with Ueli Maurer and Björn Tackmann
IACR Cryptology ePrint Archive, 2013/555 (2013).