Publication | Date of Publication | Type |
---|
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model | 2023-05-12 | Paper |
Generic traceable proxy re-encryption and accountable extension in consensus network | 2022-08-25 | Paper |
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes | 2021-12-01 | Paper |
Lattice-Based Cryptosystems | 2020-12-07 | Paper |
IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited | 2020-06-30 | Paper |
Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
Key encapsulation mechanism with explicit rejection in the quantum random oracle model | 2020-01-28 | Paper |
On the hardness of the computational ring-LWR problem and its applications | 2018-12-20 | Paper |
Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise | 2018-11-07 | Paper |
Security of the SM2 signature scheme against generalized key substitution attacks | 2018-10-26 | Paper |
Fast lottery-based micropayments for decentralized currencies | 2018-09-26 | Paper |
Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension | 2018-01-19 | Paper |
Expanded Framework for Dual System Encryption and Its Application | 2017-05-19 | Paper |
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model | 2017-05-05 | Paper |
UC-secure and Contributory Password-Authenticated Group Key Exchange | 2016-12-21 | Paper |
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes | 2016-11-09 | Paper |
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model | 2016-03-10 | Paper |
Generic constructions of integrated PKE and PEKS | 2016-02-19 | Paper |
Certificateless Proxy Re-Encryption Without Pairings | 2015-10-16 | Paper |
Authenticated Key Exchange from Ideal Lattices | 2015-09-30 | Paper |
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol | 2015-07-16 | Paper |
Proxy Re-encryption with Unforgeable Re-encryption Keys | 2015-02-10 | Paper |
Black-Box Separations for One-More (Static) CDH and Its Generalization | 2015-01-06 | Paper |
PRE: stronger security notions and efficient construction with non-interactive opening | 2014-06-23 | Paper |
Towards a Secure Certificateless Proxy Re-Encryption Scheme | 2013-10-23 | Paper |
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures | 2013-03-18 | Paper |
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening | 2013-01-07 | Paper |
A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings | 2013-01-07 | Paper |
Combined Public-Key Schemes: The Case of ABE and ABS | 2012-11-06 | Paper |
Fully Secure Doubly-Spatial Encryption under Simple Assumptions | 2012-11-06 | Paper |
Authenticated Key Exchange with Entities from Different Settings and Varied Groups | 2012-11-06 | Paper |
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts | 2012-09-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3116378 | 2012-02-22 | Paper |
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost | 2011-09-16 | Paper |
Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security | 2011-09-16 | Paper |
Certificateless threshold ring signature | 2009-10-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610971 | 2009-03-06 | Paper |
A New Anonymous Password-Based Authenticated Key Exchange Protocol | 2009-01-22 | Paper |
Certificateless signature: a new security model and an improved generic construction | 2007-09-20 | Paper |
Key Replacement Attack Against a Generic Construction of Certificateless Signature | 2007-09-07 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
Cryptanalysis of AW digital signature scheme based on error-correcting codes | 2007-02-20 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q5491195 | 2006-10-10 | Paper |
An additive problem with primes in arithmetic progressions | 2006-01-09 | Paper |
Cryptanalysis of some signature schemes with message recovery | 2005-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823630 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823929 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434314 | 2004-01-26 | Paper |
The ternary Goldbach problem with primes in arithmetic progressions | 2002-04-16 | Paper |