| Evasive LWE assumptions: Definitions, classes, and counterexamples C Brzuska, A Ünal, IKY Woo International Conference on the Theory and Application of Cryptology and …, 2024 | 32 | 2024 |
| Impossibility results for lattice-based functional encryption schemes A Ünal Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 17 | 2020 |
| Worst-case subexponential attacks on PRGs of constant degree or constant locality A Ünal Annual International Conference on the Theory and Applications of …, 2023 | 16 | 2023 |
| New Baselines for Local Pseudorandom Number Generators by Field Extensions A Ünal Cryptology ePrint Archive, 2023 | 9 | 2023 |
| Compact selective opening security from LWE D Hofheinz, K Hostáková, J Kastner, K Klein, A Ünal IACR International Conference on Public-Key Cryptography, 127-160, 2024 | 8 | 2024 |
| The price of verifiability: Lower bounds for verifiable random functions N Brandt, D Hofheinz, J Kastner, A Ünal Theory of Cryptography Conference, 747-776, 2022 | 6 | 2022 |
| Lower bounds for lattice-based compact functional encryption E Tairi, A Ünal Annual International Conference on the Theory and Applications of …, 2024 | 4 | 2024 |
| On the Soundness of Algebraic Attacks against Code-based Assumptions MC Noval, SP Merz, P Stählin, A Ünal Cryptology ePrint Archive, 2025 | 2 | 2025 |
| Cryptanalysis by Algebraic Relations A Ünal ETH Zurich, 2024 | 2 | 2024 |
| Decoding LTFs in the Generic Group Model D Hofheinz, J Kastner, A Ünal, B Ursu Cryptology ePrint Archive, 2023 | 1 | 2023 |