Publications

(2025). Modeling Emails: On the Deniability of BCCs. Cryptology ePrint Archive.
(2025). Snake Mackerel: An Isogeny-Based AKEM Leveraging Randomness Reuse. Cryptology ePrint Archive.
(2025). Shadowfax: A Deniability-Preserving AKEM Combiner. Cryptology ePrint Archive.
(2024). A Closer Look at Falcon. Cryptology ePrint Archive.
(2024). Ring Signatures for Deniable AKEM: Gandalf's Fellowship. CRYPTO 2024.
(2023). The Pre-Shared Key Modes of HPKE. ASIACRYPT 2023.
(2023). A method for securely comparing integers using binary trees. PoPETS 2023.
(2022). Computation on encrypted data using dataflow authentication. ACM Transactions on Privacy and Security 2022.
(2020). PASAPTO: Policy-aware Security and Performance Trade-off Analysis--Computation on Encrypted Data with Restricted Leakage. CSF 2020.