| Publication | Date of Publication | Type |
|---|
| Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability | 2024-11-12 | Paper |
| Generalised asynchronous remote key generation for pairing-based cryptosystems | 2023-11-09 | Paper |
Hierarchical Attribute-Based Signatures Cryptology and Network Security | 2023-06-28 | Paper |
| Revocable hierarchical attribute-based signatures from lattices | 2022-11-09 | Paper |
| Biometric-authenticated searchable encryption | 2021-02-23 | Paper |
| Hierarchical attribute-based signatures: short keys and optimal signature length | 2020-01-30 | Paper |
| Blind password registration for two-server password authenticated key exchange and secret sharing protocols | 2018-10-18 | Paper |
| Universally composable two-server PAKE | 2018-10-18 | Paper |
| Oblivious PAKE: efficient handling of password trials | 2018-10-18 | Paper |
Distributed smooth projective hashing and its application to two-server password authenticated key exchange Applied Cryptography and Network Security | 2014-07-07 | Paper |
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Information Security and Privacy | 2013-06-28 | Paper |
Forward-secure hierarchical predicate encryption Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Publicly verifiable ciphertexts Lecture Notes in Computer Science | 2012-09-25 | Paper |
Fully private revocable predicate encryption Information Security and Privacy | 2012-09-07 | Paper |
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange Information Security and Privacy | 2012-09-07 | Paper |
Non-interactive and re-usable universally composable string commitments with adaptive security Lecture Notes in Computer Science | 2011-12-02 | Paper |
Affiliation-hiding authentication with minimal bandwidth consumption Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication | 2011-10-14 | Paper |
Private discovery of common social contacts Applied Cryptography and Network Security | 2011-06-28 | Paper |
Taming Big Brother Ambitions: More Privacy for Secret Handshakes Privacy Enhancing Technologies | 2010-08-10 | Paper |
Generic one round group key exchange in the standard model Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Modeling leakage of ephemeral secrets in tripartite/group key exchange Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Redactable signatures for tree-structured data: definitions and constructions Applied Cryptography and Network Security | 2010-07-06 | Paper |
Privacy-preserving group discovery with linear complexity Applied Cryptography and Network Security | 2010-07-06 | Paper |
Affiliation-hiding key exchange with untrusted group authorities Applied Cryptography and Network Security | 2010-07-06 | Paper |
Confidential Signatures and Deterministic Signcryption Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Public-key encryption with non-interactive opening: new constructions and stronger definitions Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Flexible group key exchange with on-demand computation of subgroup keys Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Fully Robust Tree-Diffie-Hellman Group Key Exchange Cryptology and Network Security | 2009-11-26 | Paper |
User-aware provably secure protocols for browser-based mutual authentication International Journal of Applied Cryptography | 2009-10-12 | Paper |
Securing group key exchange against strong corruptions and key registration attacks International Journal of Applied Cryptography | 2009-02-24 | Paper |
Universally Composable Security Analysis of TLS Provable Security | 2009-01-27 | Paper |
Property-Based Attestation without a Trusted Third Party Lecture Notes in Computer Science | 2008-11-20 | Paper |
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy Information Security and Privacy | 2008-07-08 | Paper |
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting Financial Cryptography and Data Security | 2008-03-07 | Paper |