| Publication | Date of Publication | Type |
|---|
| Provably secure group authentication in the asynchronous communication model | 2024-04-19 | Paper |
Ideal dynamic threshold multi-secret data sharing in smart environments for sustainable cities Information Sciences | 2023-09-08 | Paper |
Lightweight noninteractive membership authentication and group key establishment for WSNs Mathematical Problems in Engineering | 2021-05-14 | Paper |
Secret sharing with secure secret reconstruction Information Sciences | 2021-03-31 | Paper |
Realizing secret sharing with general access structure Information Sciences | 2020-01-06 | Paper |
Authenticated Group Key Transfer Protocol Based on Secret Sharing IEEE Transactions on Computers | 2017-07-27 | Paper |
Group Authentication IEEE Transactions on Computers | 2017-07-12 | Paper |
Dynamic threshold secret reconstruction and its application to the threshold cryptography Information Processing Letters | 2015-07-15 | Paper |
Multilevel threshold secret sharing based on the Chinese remainder theorem Information Processing Letters | 2014-05-05 | Paper |
Contract signature in e-commerce Computers and Electrical Engineering | 2011-07-28 | Paper |
Strong \((n, t, n)\) verifiable secret sharing scheme Information Sciences | 2010-09-02 | Paper |
Detection and identification of cheaters in \((t,n)\) secret sharing scheme Designs, Codes and Cryptography | 2009-03-31 | Paper |
Improved DSA variant for batch verification Applied Mathematics and Computation | 2005-11-16 | Paper |
| scientific article; zbMATH DE number 2085212 (Why is no real title available?) | 2004-08-09 | Paper |
Public-key cryptosystems based on cubic finite field extensions IEEE Transactions on Information Theory | 2000-09-07 | Paper |
| scientific article; zbMATH DE number 697821 (Why is no real title available?) | 2000-06-21 | Paper |
| scientific article; zbMATH DE number 1024004 (Why is no real title available?) | 1997-09-07 | Paper |
| scientific article; zbMATH DE number 1024032 (Why is no real title available?) | 1997-08-10 | Paper |
Fair reconstruction of a secret Information Processing Letters | 1997-02-28 | Paper |
Comment: Enhancing the security of El Gamal's signature scheme IEE Proceedings - Computers and Digital Techniques | 1995-12-11 | Paper |
| scientific article; zbMATH DE number 697833 (Why is no real title available?) | 1995-11-28 | Paper |
Group-oriented (t, n) threshold digital signature scheme and digital multisignature IEE Proceedings - Computers and Digital Techniques | 1995-09-17 | Paper |
Threshold cryptosystem with multiple secret sharing policies IEE Proceedings - Computers and Digital Techniques | 1995-05-30 | Paper |
Public-key cryptosystem design based on factoring and discrete logarithms IEE Proceedings - Computers and Digital Techniques | 1995-05-14 | Paper |
| scientific article; zbMATH DE number 708832 (Why is no real title available?) | 1995-01-09 | Paper |
| scientific article; zbMATH DE number 697809 (Why is no real title available?) | 1995-01-08 | Paper |
| scientific article; zbMATH DE number 697808 (Why is no real title available?) | 1994-11-30 | Paper |
An efficient probabilistic encryption scheme Information Processing Letters | 1990-01-01 | Paper |
Improved Rabin's scheme with high efficiency Electronics Letters | 1989-01-01 | Paper |
New scheme for digital multisignatures Electronics Letters | 1989-01-01 | Paper |
2-bit, chained, probabilistic encryption scheme Electronics Letters | 1989-01-01 | Paper |
Public-key encryption algorithm incorporating error detection Electronics Letters | 1989-01-01 | Paper |