| Publication | Date of Publication | Type |
|---|
Forward security under leakage resilience, revisited | 2024-06-05 | Paper |
Instantiability of classical random-oracle-model encryption transforms Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Beyond Uber: instantiating generic groups via PGGs Theory of Cryptography | 2023-08-14 | Paper |
Forward-security under continual leakage Cryptology and Network Security | 2023-08-02 | Paper |
Approximate distance-comparison-preserving symmetric encryption Lecture Notes in Computer Science | 2023-07-25 | Paper |
Ad Hoc Multi-Input Functional Encryption. | 2023-02-03 | Paper |
Toward RSA-OAEP without random oracles Lecture Notes in Computer Science | 2022-10-13 | Paper |
On selective-opening security of deterministic primitives | 2021-12-21 | Paper |
Leakage resilience from program obfuscation Journal of Cryptology | 2019-08-13 | Paper |
Parameter-hiding order revealing encryption | 2018-12-20 | Paper |
A unified framework for trapdoor-permutation-based sequential aggregate signatures | 2018-05-29 | Paper |
Selective-Opening Security in the Presence of Randomness Failures Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Multi-input functional encryption with unbounded-message security Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Leakage-resilient public-key encryption from obfuscation Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Deniable Functional Encryption Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
A unified approach to deterministic encryption: new constructions and a connection to computational entropy Journal of Cryptology | 2015-08-03 | Paper |
Enhanced chosen-ciphertext security and applications Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
On the achievability of simulation-based security for functional encryption Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Dual form signatures: an approach for proving security from static assumptions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy Theory of Cryptography | 2012-06-15 | Paper |
Order-preserving encryption revisited: improved security analysis and alternative solutions Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Bi-deniable public-key encryption Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Correlated-input secure hash functions Theory of Cryptography | 2011-05-19 | Paper |
Adaptive trapdoor functions and chosen-ciphertext security Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Order-Preserving Symmetric Encryption Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Deterministic and Efficiently Searchable Encryption Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
New Multiparty Signature Schemes for Network Routing Applications ACM Transactions on Information and System Security | 2009-02-24 | Paper |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles Lecture Notes in Computer Science | 2009-02-10 | Paper |
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles Lecture Notes in Computer Science | 2009-02-10 | Paper |