| Publication | Date of Publication | Type |
|---|
Universally composable relaxed asymmetric password-authenticated key exchange | 2025-01-10 | Paper |
1-out-of-\(n\) oblivious signatures: security revisited and a generic construction with an efficient communication cost | 2024-05-31 | Paper |
Auditable attribute-based credentials scheme and its application in contact tracing | 2024-05-31 | Paper |
Analysis of (U,U+V)-code problem with Gramian over binary and ternary fields Lecture Notes in Computer Science | 2023-08-21 | Paper |
Pointcheval-Sanders signature-based synchronized aggregate signature Lecture Notes in Computer Science | 2023-08-21 | Paper |
Turn-based communication channels | 2023-04-13 | Paper |
Watermarkable signature with computational function preserving | 2023-03-21 | Paper |
Receiver selective opening CCA secure public key encryption from various assumptions | 2023-03-21 | Paper |
Non-committing encryption with constant ciphertext expansion from standard assumptions | 2023-03-21 | Paper |
Approximation and special cases of common subtrees and editing distance | 2023-01-25 | Paper |
Forward secure message franking | 2022-12-07 | Paper |
Efficient two-party exponentiation from quotient transfer | 2022-11-09 | Paper |
Generic constructions for fully secure revocable attribute-based encryption | 2022-08-25 | Paper |
Payment trees: low collateral payments for payment channel networks | 2022-06-22 | Paper |
Obfustopia built on secret-key functional encryption Journal of Cryptology | 2022-06-08 | Paper |
CCA security and trapdoor functions via key-dependent-message security Journal of Cryptology | 2022-04-04 | Paper |
Security definitions on time-lock puzzles | 2022-03-24 | Paper |
Secret sharing with statistical privacy and computational relaxed non-malleability | 2022-03-24 | Paper |
Generic transformation from broadcast encryption to round-optimal deniable ring authentication Designs, Codes and Cryptography | 2022-03-21 | Paper |
Impossibility on tamper-resilient cryptography with uniqueness properties | 2021-12-21 | Paper |
Tightly secure ring signatures in the standard model Theoretical Computer Science | 2021-10-21 | Paper |
Fine-grained cryptography revisited Journal of Cryptology | 2021-07-30 | Paper |
Simple and generic constructions of succinct functional encryption Journal of Cryptology | 2021-07-30 | Paper |
Improved security proof for the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme | 2021-06-08 | Paper |
A t-out-of-n Redactable Signature Scheme Cryptology and Network Security | 2020-07-20 | Paper |
Fine-grained cryptography revisited Lecture Notes in Computer Science | 2020-05-11 | Paper |
Simple and efficient KDM-CCA secure public key encryption | 2020-05-11 | Paper |
Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem | 2020-05-11 | Paper |
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
CCA security and trapdoor functions via key-dependent-message security Advances in Cryptology – CRYPTO 2019 | 2020-03-09 | Paper |
Anonymous single-round server-aided verification | 2020-03-02 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Theoretical Computer Science | 2019-10-18 | Paper |
A framework for achieving KDM-CCA secure public-key encryption | 2019-01-23 | Paper |
Group signature with deniability: how to disavow a signature | 2018-10-26 | Paper |
Lower bounds for key length of \(k\)-wise almost independent permutations and certain symmetric-key encryption schemes | 2018-10-24 | Paper |
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions Lecture Notes in Computer Science | 2018-10-17 | Paper |
Fully anonymous group signature with verifier-local revocation | 2018-10-17 | Paper |
CCA2 key-privacy for code-based encryption in the standard model | 2018-09-12 | Paper |
Memory lower bounds of reductions revisited | 2018-07-09 | Paper |
Obfustopia built on secret-key functional encryption Advances in Cryptology – EUROCRYPT 2018 | 2018-07-09 | Paper |
Simple and generic constructions of succinct functional encryption Public-Key Cryptography – PKC 2018 | 2018-05-29 | Paper |
Key dependent message security and receiver selective opening security for identity-based encryption | 2018-05-16 | Paper |
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Signatures Resilient to Uninvertible Leakage Lecture Notes in Computer Science | 2016-10-21 | Paper |
On the complexity of negation-limited Boolean networks (preliminary version) Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94 | 2016-09-01 | Paper |
On the key dependent message security of the Fujisaki-Okamoto constructions Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Completeness of single-bit projection-KDM security for public key encryption Lecture Notes in Computer Science | 2016-03-02 | Paper |
Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency Information Security and Privacy | 2015-10-20 | Paper |
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency Provable Security | 2015-09-29 | Paper |
Efficient key dependent message security amplification against chosen ciphertext attacks Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
Game-theoretic security for bit commitment Advances in Information and Computer Security | 2014-09-15 | Paper |
Attacks to the proxy re-encryption schemes from IWSEC2011 Advances in Information and Computer Security | 2014-09-15 | Paper |
Strongly simulation-extractable leakage-resilient NIZK Information Security and Privacy | 2014-07-24 | Paper |
Factoring-based proxy re-encryption schemes Provable Security | 2013-10-23 | Paper |
Grey-box public-key steganography Lecture Notes in Computer Science | 2013-05-28 | Paper |
Symmetric-key encryption scheme with multi-ciphertext non-malleability Advances in Information and Computer Security | 2013-04-04 | Paper |
Proxy re-encryption in a stronger security model extended from CT-RSA2012 Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees Theoretical Computer Science | 2013-02-19 | Paper |
Leakage-resilience of stateless/stateful public-key encryption from hash proofs Information Security and Privacy | 2012-09-07 | Paper |
A Game-Theoretic Perspective on Oblivious Transfer Information Security and Privacy | 2012-09-07 | Paper |
Weak oblivious transfer from strong one-way functions Provable Security | 2011-09-16 | Paper |
Randomness leakage in the KEM/DEM framework Provable Security | 2011-09-16 | Paper |
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity Lecture Notes in Computer Science | 2011-05-19 | Paper |
A multi-trapdoor commitment scheme from the RSA assumption Information Security and Privacy | 2010-10-25 | Paper |
CCA proxy re-encryption without bilinear maps in the standard model Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Security of Encryption Schemes in Weakened Random Oracle Models Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Efficient public key encryption based on ideal lattices (extended abstract) Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Efficient non-interactive universally composable string-commitment schemes Provable Security | 2009-12-11 | Paper |
Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge Provable Security | 2009-12-11 | Paper |
On the insecurity of the Fiat-Shamir signatures with iterative hash functions Provable Security | 2009-12-11 | Paper |
Algorithms and Computation Lecture Notes in Computer Science | 2009-08-07 | Paper |
Limiting negations in bounded-depth circuits: an extension of Markov's theorem Information Processing Letters | 2009-07-21 | Paper |
Multi-recipient Public-Key Encryption from Simulators in Security Proofs Information Security and Privacy | 2009-06-25 | Paper |
On the Weak Ideal Compression Functions Information Security and Privacy | 2009-06-25 | Paper |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework Information Security and Privacy | 2009-06-25 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Anonymity on Paillier’s Trap-Door Permutation Information Security and Privacy | 2009-03-06 | Paper |
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Public-Key Cryptosystems with Primitive Power Roots of Unity Information Security and Privacy | 2008-07-08 | Paper |
Universally Anonymizable Public-Key Encryption Lecture Notes in Computer Science | 2008-03-18 | Paper |
Security of Digital Signature Schemes in Weakened Random Oracle Models Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity Information Security and Privacy | 2007-09-07 | Paper |
Multi-bit Cryptosystems Based on Lattice Problems Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Notch effect on fatigue strength reduction of bearing steel in the very high cycle regime International Journal of Fatigue | 2006-10-27 | Paper |
Smart structure for suppression of mode I and II crack propagation in CFRP laminates by shape memory alloy TiNi actuator International Journal of Fatigue | 2006-10-10 | Paper |
Mode II fatigue crack growth from delamination in unidirectional tape and satin-woven fabric laminates of high strength GFRP International Journal of Fatigue | 2006-10-10 | Paper |
Fatigue damage evaluation in SiCp/2024 by X-ray diffraction method International Journal of Fatigue | 2006-10-10 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Quantum bit-commitment for small storage based on quantum one-way permutations New Generation Computing | 2004-09-22 | Paper |
scientific article; zbMATH DE number 1759776 (Why is no real title available?) | 2002-10-07 | Paper |
scientific article; zbMATH DE number 1788728 (Why is no real title available?) | 2002-08-26 | Paper |
An exponential gap with the removal of one negation gate Information Processing Letters | 2002-07-14 | Paper |
An extension of Grover's quantum search algorithm RIMS Kokyuroku | 2001-09-17 | Paper |
scientific article; zbMATH DE number 1507247 (Why is no real title available?) | 2001-02-04 | Paper |
scientific article; zbMATH DE number 1511713 (Why is no real title available?) | 2000-09-27 | Paper |
scientific article; zbMATH DE number 1404249 (Why is no real title available?) | 2000-02-20 | Paper |
scientific article; zbMATH DE number 1395314 (Why is no real title available?) | 2000-01-30 | Paper |
scientific article; zbMATH DE number 1380771 (Why is no real title available?) | 1999-12-20 | Paper |
scientific article; zbMATH DE number 1379306 (Why is no real title available?) | 1999-12-15 | Paper |
scientific article; zbMATH DE number 1372647 (Why is no real title available?) | 1999-12-01 | Paper |
scientific article; zbMATH DE number 1322339 (Why is no real title available?) | 1999-11-08 | Paper |
Minimizing maximum absolute lateness and range of lateness under generalized due dates on a single machine Annals of Operations Research | 1999-06-10 | Paper |
scientific article; zbMATH DE number 1263235 (Why is no real title available?) | 1999-03-16 | Paper |
On the Complexity of Negation-Limited Boolean Networks SIAM Journal on Computing | 1998-09-20 | Paper |
Minimizing The Range Of Lateness On A Single Machine Under Generalized Due Dates INFOR: Information Systems and Operational Research | 1998-09-07 | Paper |
Negation-limited circuit complexity of symmetric functions Information Processing Letters | 1997-02-27 | Paper |
A Dislocation Model for Fatigue Crack Initiation Journal of Applied Mechanics | 1981-01-01 | Paper |