Swoosh: Efficient lattice-based non-interactive key exchange P Gajland, B de Kock, M Quaresma, G Malavolta, P Schwabe In 33rd USENIX Security Symposium, 2024 | 22* | 2024 |
WhatsUpp with sender keys? Analysis, improvements and security proofs D Balbás, D Collins, P Gajland International Conference on the Theory and Application of Cryptology and …, 2023 | 10 | 2023 |
Ring Signatures for Deniable AKEM: Gandalf’s Fellowship P Gajland, J Janneck, E Kiltz Annual International Cryptology Conference (CRYPTO), 305-338, 2024 | 7 | 2024 |
Laconic function evaluation for turing machines N Döttling, P Gajland, G Malavolta IACR International Conference on Public-Key Cryptography (PKC), 606-634, 2023 | 7 | 2023 |
The challenges of bringing cryptography from research papers to products: results from an interview study with experts K Fischer, I Trummová, P Gajland, Y Acar, S Fahl, A Sasse 33rd USENIX Security Symposium (USENIX Security 24), 7213-7230, 2024 | 6 | 2024 |
Analysis and improvements of the sender keys protocol for group messaging D Balbás, D Collins, P Gajland arXiv preprint arXiv:2301.07045, 2023 | 5 | 2023 |
A Closer Look at Falcon P Gajland, J Janneck, E Kiltz Cryptology ePrint Archive, 2024 | 1 | 2024 |
Shadowfax: Combiners for Deniability P Gajland, V Hwang, J Janneck Cryptology ePrint Archive, 2025 | | 2025 |
Adoption Challenges for Cryptographic Protocols K Fischesr, I Trummová, P Gajland, Y Acar, S Fahl, MA Sasse IEEE Security & Privacy, 2024 | | 2024 |
On Asynchronous Group Key Agreement: Tripartite Asynchronous Ratchet Trees P Gajland | | 2020 |