| Publication | Date of Publication | Type |
|---|
| Efficient identity-based inner product functional encryption from RLWE | 2026-03-23 | Paper |
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing Designs, Codes and Cryptography | 2024-12-11 | Paper |
| Anonymous broadcast authentication with logarithmic-order ciphertexts from LWE | 2024-06-05 | Paper |
| A Tightly Secure Identity-Based Signature Scheme from Isogenies | 2024-04-26 | Paper |
Authenticated encryption for very short inputs Topics in Cryptology – CT-RSA 2023 | 2023-10-04 | Paper |
Group testing aggregate signatures with soundness Lecture Notes in Computer Science | 2023-08-21 | Paper |
Identity-based interactive aggregate signatures from lattices Lecture Notes in Computer Science | 2023-08-21 | Paper |
Non-adaptive Group-Testing Aggregate MAC Scheme Information Security Practice and Experience | 2023-06-30 | Paper |
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication Designs, Codes and Cryptography | 2023-06-20 | Paper |
| Asymptotically tight lower bounds in anonymous broadcast encryption and authentication | 2022-06-29 | Paper |
| Quantum-secure (non-)sequential aggregate message authentication codes | 2020-05-06 | Paper |
| SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model | 2020-05-06 | Paper |
| History-free sequential aggregate MAC revisited | 2020-01-10 | Paper |
Identity-based encryption with hierarchical key-insulation in the standard model Designs, Codes and Cryptography | 2019-05-17 | Paper |
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance International Journal of Applied Cryptography | 2018-11-26 | Paper |
| Generic construction of sequential aggregate MACs from any MACs | 2018-11-07 | Paper |
| Signcryption with quantum random oracles | 2018-11-07 | Paper |
| Lower bounds on lattice enumeration with extreme pruning | 2018-09-26 | Paper |
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography IEEE Transactions on Information Theory | 2018-06-27 | Paper |
| Lattice-based signcryption without random oracles | 2018-06-22 | Paper |
Timed-release computational secret sharing and threshold encryption Designs, Codes and Cryptography | 2018-01-26 | Paper |
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness Lecture Notes in Computer Science | 2017-01-06 | Paper |
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage Provable Security | 2016-01-27 | Paper |
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer Cryptography and Coding | 2016-01-12 | Paper |
Constructions of CCA-Secure Revocable Identity-Based Encryption Information Security and Privacy | 2015-10-20 | Paper |
Information-theoretically secure entity authentication in the multi-user setting Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Information Theoretic Security for Encryption Based on Conditional Rényi Entropies Lecture Notes in Computer Science | 2015-09-30 | Paper |
Timed-release computational secret sharing scheme and its applications Provable Security | 2015-09-29 | Paper |
Timed-release secret sharing schemes with information theoretic security Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
Constructions of signcryption in the multi-user setting from identity-based encryption Cryptography and Coding | 2014-01-17 | Paper |
Information-theoretic timed-release security: key-agreement, encryption, and authentication codes Lecture Notes in Computer Science | 2012-11-06 | Paper |
Constructing secure hybrid encryption from key encapsulation mechanism with authenticity Cryptography and Coding | 2011-12-16 | Paper |
Bit commitment in the bounded storage model: tight bound and simple optimal construction Cryptography and Coding | 2011-12-16 | Paper |
Information-theoretically secure key-insulated multireceiver authentication codes Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Systematic treatment of collusion secure codes: security definitions and their relations Lecture Notes in Computer Science | 2010-02-09 | Paper |
The role of arbiters in asymmetric authentication schemes Lecture Notes in Computer Science | 2010-02-09 | Paper |
Unconditionally secure blind signatures Lecture Notes in Computer Science | 2009-12-03 | Paper |
Construction methodology of unconditionally secure signature schemes Lecture Notes in Computer Science | 2009-12-03 | Paper |
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment Formal to Practical Security | 2009-06-09 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM Information Security and Privacy | 2009-03-06 | Paper |
Unconditionally Secure Steganography Against Active Attacks IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Lecture Notes in Computer Science | 2008-03-18 | Paper |
| scientific article; zbMATH DE number 2086723 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2085422 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 1980951 (Why is no real title available?) | 2003-09-15 | Paper |
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
Unconditionally Secure Anonymous Encryption and Group Authentication Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1941244 (Why is no real title available?) | 2003-06-29 | Paper |
| scientific article; zbMATH DE number 1583775 (Why is no real title available?) | 2002-03-06 | Paper |
| scientific article; zbMATH DE number 1504542 (Why is no real title available?) | 2002-01-27 | Paper |
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography Advances in Cryptology — EUROCRYPT ’99 | 2000-06-07 | Paper |