| Publication | Date of Publication | Type |
|---|
Efficient generation of elliptic curve cryptosystems Lecture Notes in Computer Science | 2024-01-29 | Paper |
Analysis and experimentation on list update algorithms Lecture Notes in Computer Science | 2023-12-12 | Paper |
Differential-algebraic cryptanalysis of reduced-round of Serpent-256 Science China Information Sciences | 2022-10-28 | Paper |
Security of Tseng-Jan's group signature schemes Information Processing Letters | 2016-06-16 | Paper |
Cochecker: detecting capability and sensitive data leaks from component chains in Android Information Security and Privacy | 2014-07-24 | Paper |
PE(AR)\(^2\): Privacy-enhanced anonymous authentication with reputation and revocation Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Fully leakage-resilient signatures with auxiliary inputs Information Security and Privacy | 2012-09-07 | Paper |
Identity Based Ring Signature: Why, How and What Next Public Key Infrastructure | 2009-04-23 | Paper |
Secure Role Activation and Authorization in the Enterprise Environment Public Key Infrastructure | 2009-04-23 | Paper |
Identity Based Threshold Ring Signature Lecture Notes in Computer Science | 2008-03-17 | Paper |
Delegation with supervision Information Sciences | 2007-10-10 | Paper |
Efficient Identity Based Ring Signature Applied Cryptography and Network Security | 2007-09-24 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Forward-secure multisignature and blind signature schemes Applied Mathematics and Computation | 2005-11-04 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Security of Wang et al. 's group-oriented \((t,n)\) threshold signature schemes with traceable signers Information Processing Letters | 2002-07-25 | Paper |
| scientific article; zbMATH DE number 1555962 (Why is no real title available?) | 2001-01-24 | Paper |
| scientific article; zbMATH DE number 1445802 (Why is no real title available?) | 2000-05-10 | Paper |
Analyzing self-adjusting linear list algorithms with deletions and unsuccessful searches Information Processing Letters | 1997-02-27 | Paper |
| scientific article; zbMATH DE number 742968 (Why is no real title available?) | 1995-04-11 | Paper |
Unsuccessful Search in Self-Adjusting Data Structures Journal of Algorithms | 1994-03-27 | Paper |