| Publication | Date of Publication | Type |
|---|
Equivalences and black-box separations of matrix Diffie-Hellman problems Lecture Notes in Computer Science | 2017-06-13 | Paper |
An algebraic framework for Diffie-Hellman assumptions Journal of Cryptology | 2017-03-02 | Paper |
The kernel matrix Diffie-Hellman assumption Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Cryptanalysis of a key exchange scheme based on block matrices Information Sciences | 2016-07-11 | Paper |
Application of possibility theory to robust Cournot equilibrium in the electricity market Probability in the Engineering and Informational Sciences | 2016-05-23 | Paper |
Identity-based encryption with master key-dependent message security and leakage-resilience Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
An algebraic framework for Diffie-Hellman assumptions Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Optimal reductions of some decisional problems to the rank problem Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
| scientific article; zbMATH DE number 5901702 (Why is no real title available?) | 2011-05-31 | Paper |
Easy verifiable primitives and practical public key cryptosystems Lecture Notes in Computer Science | 2010-02-09 | Paper |
Public Verifiability from Pairings in Secret Sharing Schemes Selected Areas in Cryptography | 2009-11-03 | Paper |
On proper secrets, \((t,k)\)-bases and linear codes Designs, Codes and Cryptography | 2009-10-14 | Paper |
| scientific article; zbMATH DE number 5380257 (Why is no real title available?) | 2008-12-10 | Paper |
In search of mathematical primitives for deriving universal projective hash families Applicable Algebra in Engineering, Communication and Computing | 2008-05-14 | Paper |
Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
Weighted threshold secret sharing schemes Information Processing Letters | 2002-07-25 | Paper |
Computing the order of points on an elliptic curve modulo \(N\) is as difficult as factoring \(N\) Applied Mathematics Letters | 2001-08-07 | Paper |
| scientific article; zbMATH DE number 1511169 (Why is no real title available?) | 2000-09-26 | Paper |
| scientific article; zbMATH DE number 1511172 (Why is no real title available?) | 2000-09-26 | Paper |
Detection of cheaters in vector space secret sharing schemes Designs, Codes and Cryptography | 1999-04-13 | Paper |
The underlying graph of a line digraph Discrete Applied Mathematics | 1993-01-16 | Paper |
| scientific article; zbMATH DE number 4055643 (Why is no real title available?) | 1988-01-01 | Paper |