| Publication | Date of Publication | Type |
|---|
Plaintext-ciphertext matrix multiplication and FHE bootstrapping: fast and fused | 2024-12-13 | Paper |
Bootstrapping bits with CKKS | 2024-11-12 | Paper |
\textsf{SMAUG}: pushing lattice-based key encapsulation mechanisms to the limits | 2024-10-16 | Paper |
HERMES: efficient ring packing using MLWE ciphertexts and application to transciphering Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Lattice-Based Secure Biometric Authentication for Hamming Distance | 2023-04-13 | Paper |
Efficient homomorphic comparison methods with optimal complexity | 2023-03-21 | Paper |
Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\) | 2022-08-30 | Paper |
Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions Designs, Codes and Cryptography | 2022-08-04 | Paper |
On the scaled inverse of \((x^i-x^j)\) modulo cyclotomic polynomial of the form \(\Phi_{p^s}(x)\) or \(\Phi_{p^s q^t}(x)\) | 2022-05-06 | Paper |
Mhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKP | 2022-04-22 | Paper |
Practical FHE parameters against lattice attacks | 2022-02-21 | Paper |
Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions | 2021-12-21 | Paper |
Algorithms for CRT-variant of approximate greatest common divisor problem Journal of Mathematical Cryptology | 2021-05-12 | Paper |
Towards a practical cluster analysis over encrypted data | 2020-07-21 | Paper |
Efficient identity-based encryption from LWR | 2020-07-08 | Paper |
Faster bootstrapping of FHE over the integers | 2020-07-08 | Paper |
Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem | 2020-06-30 | Paper |
Numerical method for comparison on homomorphically encrypted numbers | 2020-05-05 | Paper |
Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map | 2020-03-09 | Paper |
Cryptanalysis of the CLT13 multilinear map Journal of Cryptology | 2019-06-20 | Paper |
A full RNS variant of approximate homomorphic encryption | 2019-02-20 | Paper |
Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR | 2018-10-17 | Paper |
A reusable fuzzy extractor with practical storage size: modifying Canetti et al.'s construction | 2018-09-26 | Paper |
Bootstrapping for approximate homomorphic encryption | 2018-07-09 | Paper |
The polynomial approximate common divisor problem and its application to the fully homomorphic encryption Information Sciences | 2018-05-22 | Paper |
CRT-based fully homomorphic encryption over the integers Information Sciences | 2018-05-17 | Paper |
Homomorphic encryption for arithmetic of approximate numbers | 2018-04-06 | Paper |
An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer | 2018-02-16 | Paper |
Fast Exponentiation Using Split Exponents IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Parameterized Splitting Systems for the Discrete Logarithm IEEE Transactions on Information Theory | 2017-07-27 | Paper |
On Homomorphic Signatures for Network Coding IEEE Transactions on Computers | 2017-07-27 | Paper |
On the Final Exponentiation in Tate Pairing Computations IEEE Transactions on Information Theory | 2017-06-08 | Paper |
A practical post-quantum public-key cryptosystem based on spLWE Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero LMS Journal of Computation and Mathematics | 2017-04-04 | Paper |
Cryptanalysis of the new CLT multilinear map over the integers Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Probability that the \(k\)-gcd of products of positive integers is \(B\)-friable Journal of Number Theory | 2016-06-30 | Paper |
A new approach to the discrete logarithm problem with auxiliary inputs LMS Journal of Computation and Mathematics | 2016-02-04 | Paper |
Invertible polynomial representation for private set operations Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
A group action on \({\mathbb Z}_p^{\times}\) and the generalized DLP with auxiliary inputs Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Fixed argument pairing inversion on elliptic curves Designs, Codes and Cryptography | 2015-09-30 | Paper |
Cryptanalysis of the multilinear map over the integers Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Fully homomophic encryption over the integers revisited Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Computing prime divisors in an interval Mathematics of Computation | 2015-01-30 | Paper |
Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs Mathematics of Computation | 2014-06-04 | Paper |
Constant-round privacy preserving multiset union Bulletin of the Korean Mathematical Society | 2014-01-14 | Paper |
Private over-threshold aggregation protocols Lecture Notes in Computer Science | 2013-06-04 | Paper |
Batch fully homomorphic encryption over the integers Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Compress multiple ciphertexts using ElGamal encryption schemes Journal of the Korean Mathematical Society | 2013-05-14 | Paper |
Correcting errors in private keys obtained from cold boot attacks Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Accelerating Pollard's rho algorithm on finite fields Journal of Cryptology | 2012-07-03 | Paper |
Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures Theory of Cryptography | 2012-06-15 | Paper |
Discrete logarithm problems with auxiliary inputs Journal of Cryptology | 2010-09-21 | Paper |
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme Information Processing Letters | 2009-12-18 | Paper |
ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET Journal of the Korean Mathematical Society | 2009-05-05 | Paper |
Subset-Restricted Random Walks for Pollard rho Method on ${\mathbf{F}_{p^m}}$ Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Speeding Up the Pollard Rho Method on Prime Fields Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Analysis of low Hamming weight products Discrete Applied Mathematics | 2008-09-29 | Paper |
Timed-Release and Key-Insulated Public Key Encryption Financial Cryptography and Data Security | 2008-09-09 | Paper |
Efficient Broadcast Encryption Using Multiple Interpolation Methods Lecture Notes in Computer Science | 2008-03-17 | Paper |
Batch Verifications with ID-Based Signatures Lecture Notes in Computer Science | 2008-03-17 | Paper |
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Security Analysis of the Strong Diffie-Hellman Problem Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Fast Batch Verification of Multiple Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
scientific article; zbMATH DE number 2086893 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2081063 (Why is no real title available?) | 2004-08-04 | Paper |
Nonlinearity of Boolean Functions and Hyperelliptic Curves SIAM Journal on Discrete Mathematics | 2004-01-08 | Paper |
scientific article; zbMATH DE number 1962143 (Why is no real title available?) | 2003-08-10 | Paper |
An Identity-Based Signature from Gap Diffie-Hellman Groups Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
scientific article; zbMATH DE number 1848308 (Why is no real title available?) | 2003-06-30 | Paper |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) Cryptography and Coding | 2002-11-12 | Paper |
scientific article; zbMATH DE number 1759642 (Why is no real title available?) | 2002-10-10 | Paper |
scientific article; zbMATH DE number 1759777 (Why is no real title available?) | 2002-10-07 | Paper |
scientific article; zbMATH DE number 1689598 (Why is no real title available?) | 2002-01-13 | Paper |
On remarks of lifting problems for elliptic curves Advanced Studies in Contemporary Mathematics (Pusan) | 2001-10-29 | Paper |
Division polynomials of elliptic curves over finite fields Proceedings of the Japan Academy. Series A | 2001-04-01 | Paper |
Elliptic curve lifting problem and its applications Proceedings of the Japan Academy. Series A | 2000-11-20 | Paper |
scientific article; zbMATH DE number 1457622 (Why is no real title available?) | 2000-06-12 | Paper |
The orders of the reductions of a point in the Mordell-Weil group of an elliptic curve Acta Arithmetica | 2000-03-26 | Paper |
scientific article; zbMATH DE number 1373426 (Why is no real title available?) | 1999-12-02 | Paper |
scientific article; zbMATH DE number 1186879 (Why is no real title available?) | 1999-06-29 | Paper |
Explicit valuations of division polynomials of an elliptic curve Manuscripta Mathematica | 1999-03-23 | Paper |
scientific article; zbMATH DE number 1304078 (Why is no real title available?) | 1999-01-01 | Paper |