Articles
Main page
Overview
Critical perspectives on provable security: Fifteen years of "Another Look" papers
UPDATED!!
Concrete analysis of approximate ideal-SIVP to decision Ring-LWE reduction
NEW!!
Another look at "provable security"
Another look at "provable security" II
Another look at generic groups
Another look at HMQV
Another look at non-standard DL and DH problems
Another look at automated theorem-proving
Another look at automated theorem-proving II
Another look at security definitions
Another look at tightness
Another look at tightness II
Another look at HMAC
Another look at 1-key nested MACs
Another look at non-uniformity
Another look at XCB
Another look at normal approximations in cryptanalysis
On the security of the WOTS-PRF signature scheme
The uneasy relationship between mathematics and cryptography
The brave new world of bodacious assumptions in cryptography
ECC: The serpentine course of a paradigm shift
Intractable problems in cryptography
The random oracle model: A twenty-year retrospective
Type 2 structure-preserving signature schemes revisited
Property preserving symmetric encryption revisited
Miscellaneous
RSA 2009 Excellence in Mathematics Award