| Publication | Date of Publication | Type |
|---|
Robust subgroup multi-signatures for consensus | 2022-07-06 | Paper |
Extended security arguments for signature schemes Designs, Codes and Cryptography | 2016-02-19 | Paper |
A practical leakage-resilient signature scheme in the generic group model Selected Areas in Cryptography | 2015-12-04 | Paper |
Compact hierarchical identity-based encryption based on a Harder decisional problem International Journal of Computer Mathematics | 2015-06-24 | Paper |
Limits of a conjecture on a leakage-resilient cryptosystem Information Processing Letters | 2014-04-15 | Paper |
A note on an IND-CCA2 secure paillier-based cryptosystem Information Processing Letters | 2014-04-14 | Paper |
A leakage-resilient pairing-based variant of the Schnorr signature scheme Cryptography and Coding | 2014-01-17 | Paper |
Identity-based encryption with master key-dependent message security and leakage-resilience Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Extended security arguments for signature schemes Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
On the generic construction of identity-based signatures with additional properties Advances in Mathematics of Communications | 2011-06-03 | Paper |
Chosen-ciphertext secure identity-based encryption from computational bilinear Diffie-Hellman Lecture Notes in Computer Science | 2010-11-26 | Paper |
On the security of public key cryptosystems with a double decryption mechanism Information Processing Letters | 2010-06-09 | Paper |
Public-key encryption with non-interactive opening: new constructions and stronger definitions Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Easy verifiable primitives and practical public key cryptosystems Lecture Notes in Computer Science | 2010-02-09 | Paper |
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles Theoretical Computer Science | 2009-11-06 | Paper |
A Schnorr-Like Lightweight Identity-Based Signature Scheme Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks Cryptology and Network Security | 2009-01-09 | Paper |
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles Lecture Notes in Computer Science | 2008-11-27 | Paper |
Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) Lecture Notes in Computer Science | 2008-11-20 | Paper |
Relations Among Notions of Security for Identity Based Encryption Schemes LATIN 2006: Theoretical Informatics | 2008-09-18 | Paper |
A Generic Construction for Token-Controlled Public Key Encryption Financial Cryptography and Data Security | 2008-09-09 | Paper |
On the Generic Construction of Identity-Based Signatures with Additional Properties Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles Information Security and Privacy | 2007-09-07 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |