Publications

Research Interests

My interests in cryptography include blockchains, random-number generation, secure communication, symmetric primitives, public-key encryption, non-malleable codes, multi-party computation, as well as cryptocurrencies and blockchains. I've also worked in the area of quantum information in the past.

New Papers


Continuous Group Key Agreement with Active Security

with Joël Alwen, Daniel Jost, and Marta Mularczyk

In submission. IACR Cryptology ePrint Archive, 2020:752 (2020).


Hydra: Fast Isomorphic State Channels

with Manuel M. T. Chakravarty, Matthias Fitzi, Peter Gazi, Philipp Kant, Aggelos Kiayias, and Alexander Russell

In submission. IACR Cryptology ePrint Archive, 2020:299 (2020)


Security Analysis and Improvements for the IETF MLS Standard for Group Messaging

with Joël Alwen, Yevgeniy Dodis, and Yiannis Tselekounis

To appear at CRYPTO 2020. IACR Cryptology ePrint Archive, 2019:1189 (2019)

Conference Papers


Seedless Fruit Is the Sweetest: Random-Number Generation, Revisited

with Yevgeniy Dodis, Harish Karthikeyan, and Stefano Tessaro

CRYPTO 2019. Lecture Notes in Computer Science, Springer, vol. 11692, pp. 205– 234, Aug 2019.


Rate-Optimizing Compilers for Continuously Non-Malleable Codes

with Antonio Faonio and Daniele Venturi

ACNS 2019. Lecture Notes in Computer Science, Springer, vol. 11464, pp. 3–23, June 2019.


The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol

with Joël Alwen and Yevgeniy Dodis

EUROCRYPT 2019. Lecture Notes in Computer Science, Springer, vol. 11476, pp. 129–158, May 2019.


Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models

with Yevgeniy Dodis and Siyao Guo

CRYPTO 2018. Lecture Notes in Computer Science, Springer, vol. 10991, pp. 693–721, August 2018.


Random Oracles and Non-Uniformity

with Yevgeniy Dodis, Siyao Guo, and John Steinberger

EUROCRYPT 2018, Lecture Notes in Computer Science, Springer, vol. 10820, pp. 227–258, April 2018.


Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols

with Ran Cohen, Juan Garay, and Vassilis Zikas

ICALP 2017, LIPIcs, vol. 80, 37:1-37:15.


Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions

with Juan Garay, Martin Hirt, and Vassilis Zikas

ASIACRYPT 2016, Lecture Notes in Computer Science, Springer, vol. 10032, pp. 998–1021, August 2016.


Probabilistic Termination and Composability of Cryptographic Protocols

with Ran Cohen, Juan Garay, and Vassilis Zikas

CRYPTO 2016, Lecture Notes in Computer Science, Springer, vol. 9816, pp. 240–269, August 2016.


Non-Malleable Encryption: Simpler, Shorter, Stronger

with Yevgeniy Dodis, Björn Tackmann, and Daniele Venturi

TCC 2016-A, Lecture Notes in Computer Science, Springer, vol. 9562, pp. 306–335, Jan 2016.


From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes

with Ueli Maurer, Björn Tackmann, and Daniele Venturi

TCC 2015, Lecture Notes in Computer Science, Springer, vol. 9014, pp. 532–560, Mar 2015.


Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited

with Ueli Maurer and Björn Tackmann

ASIACRYPT 2013, Lecture Notes in Computer Science, Springer, vol. 8269, pp. 134–153, Dec 2013.

Journal Papers


Probabilistic Termination and Composability of Cryptographic Protocols

with Ran Cohen, Juan Garay, and Vassilis Zikas

J. Cryptology, vol. 32(3), pp. 690–741, Oct 2019.


Non-Locality is Transitive

with Esther Hänggi and Stefan Wolf

Phys. Rev. Lett., American Physical Society, vol. 107, pp. 100402, Aug 2011.

Book Chapters


A Constructive Perspective on Key Encapsulation

with Ueli Maurer and Björn Tackmann

Number Theory and Cryptography, Lecture Notes in Computer Science, Springer, vol. 8260, pp. 226–239, 2013.


Manuscripts


Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design

with Ueli Maurer and Björn Tackmann

IACR Cryptology ePrint Archive, 2013/555 (2013).