| Publication | Date of Publication | Type |
|---|
| Theoretical and empirical analysis of FALCON and SOLMAE using their Python implementation | 2024-05-31 | Paper |
Revocable decentralized multi-authority functional encryption Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Improving bounds for the number of correlation immune Boolean functions Information Processing Letters | 2016-05-26 | Paper |
Identity-based chameleon hashing and signatures without key exposure Information Sciences | 2016-01-14 | Paper |
Discrete logarithm based chameleon hashing and signatures without key exposure Computers and Electrical Engineering | 2013-05-31 | Paper |
Generic security-amplifying methods of ordinary digital signatures Information Sciences | 2012-10-17 | Paper |
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment Mathematical and Computer Modelling | 2012-08-24 | Paper |
New receipt-free voting scheme using double-trapdoor commitment Information Sciences | 2011-06-17 | Paper |
Hidden attribute-based signatures without anonymity revocation Information Sciences | 2010-06-11 | Paper |
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings Computers and Electrical Engineering | 2010-04-07 | Paper |
The ring authenticated encryption scheme-how to provide a clue wisely Information Sciences | 2009-03-24 | Paper |
Efficient generic on-line/off-line (threshold) signatures without key exposure Information Sciences | 2008-11-20 | Paper |
Generic Security-Amplifying Methods of Ordinary Digital Signatures Applied Cryptography and Network Security | 2008-06-13 | Paper |
Practical Threshold Signatures Without Random Oracles Provable Security | 2008-06-10 | Paper |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature Provable Security | 2008-06-10 | Paper |
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment Lecture Notes in Computer Science | 2008-05-06 | Paper |
Mobile RFID Applications and Security Challenges Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Practical convertible authenticated encryption schemes using self-certified public keys Applied Mathematics and Computation | 2005-11-14 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Security of a multisignature scheme for specified group of verifiers Applied Mathematics and Computation | 2005-08-05 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Cryptanalysis of Lee-Hwang-Li's key authentication scheme Applied Mathematics and Computation | 2005-02-22 | Paper |
Highly reliable trust establishment scheme in ad hoc networks Computer Networks | 2004-11-12 | Paper |
| scientific article; zbMATH DE number 2048545 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2043331 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 2043321 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1980952 (Why is no real title available?) | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1955793 (Why is no real title available?) | 2003-07-29 | Paper |
| scientific article; zbMATH DE number 1950626 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950355 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950344 (Why is no real title available?) | 2003-07-17 | Paper |
ID-Based Blind Signature and Ring Signature from Pairings Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1857524 (Why is no real title available?) | 2003-05-19 | Paper |
| scientific article; zbMATH DE number 1759662 (Why is no real title available?) | 2002-11-23 | Paper |
| scientific article; zbMATH DE number 1759642 (Why is no real title available?) | 2002-10-10 | Paper |
| scientific article; zbMATH DE number 1808281 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1689600 (Why is no real title available?) | 2002-01-13 | Paper |
| scientific article; zbMATH DE number 1583949 (Why is no real title available?) | 2001-07-08 | Paper |
| scientific article; zbMATH DE number 1612500 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1107689 (Why is no real title available?) | 1998-05-03 | Paper |
| scientific article; zbMATH DE number 1024089 (Why is no real title available?) | 1997-06-18 | Paper |
| scientific article; zbMATH DE number 697801 (Why is no real title available?) | 1995-02-19 | Paper |
| scientific article; zbMATH DE number 503275 (Why is no real title available?) | 1994-03-07 | Paper |