| Publication | Date of Publication | Type |
|---|
Functional commitments for arbitrary circuits of bounded sizes Designs, Codes and Cryptography | 2024-12-11 | Paper |
Universal composable password authenticated key exchange for the post-quantum world | 2024-11-13 | Paper |
More efficient public-key cryptography with leakage and tamper resilience | 2024-11-12 | Paper |
Multi-hop fine-grained proxy re-encryption | 2024-11-12 | Paper |
High accuracy AUV-aided underwater localization: far-field information fusion perspective IEEE Transactions on Signal Processing | 2024-09-16 | Paper |
Fine-grained proxy re-encryption: definitions and constructions from LWE | 2024-09-13 | Paper |
Robustly reusable fuzzy extractor from isogeny Theoretical Computer Science | 2024-08-20 | Paper |
Biometric-based two-factor authentication scheme under database leakage Theoretical Computer Science | 2024-05-02 | Paper |
Entropy regularization methods for parameter space exploration Information Sciences | 2024-04-25 | Paper |
Almost tight multi-user security under adaptive corruptions from LWE in the standard model Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
EKE meets tight security in the universally composable framework Lecture Notes in Computer Science | 2023-11-24 | Paper |
Fine-grained verifier NIZK and its applications Lecture Notes in Computer Science | 2023-11-16 | Paper |
Early detection of rotating stall in axial flow compressors via deterministic learning: detectability analysis Control Theory and Technology | 2023-11-07 | Paper |
Privacy-preserving authenticated key exchange in the standard model Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Anonymous public key encryption under corruptions Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Fuzzy authenticated key exchange with tight security Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness Lecture Notes in Computer Science | 2023-05-12 | Paper |
Simulatable verifiable random function from the LWE assumption Theoretical Computer Science | 2023-04-27 | Paper |
Approaching epidemiological dynamics of COVID-19 with physics-informed neural networks | 2023-02-17 | Paper |
Authenticated key exchange and signatures with tight security in the standard model | 2022-05-18 | Paper |
Tightly CCA-secure inner product functional encryption scheme Theoretical Computer Science | 2021-12-01 | Paper |
Pseudorandom functions in NC class from the standard LWE assumption Designs, Codes and Cryptography | 2021-11-11 | Paper |
Multilinear maps from obfuscation Journal of Cryptology | 2020-06-15 | Paper |
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system | 2020-03-09 | Paper |
Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
QANIZK for adversary-dependent languages and their applications Theoretical Computer Science | 2019-06-06 | Paper |
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption Designs, Codes and Cryptography | 2018-10-10 | Paper |
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system Designs, Codes and Cryptography | 2018-06-26 | Paper |
Tightly SIM-SO-CCA secure public key encryption from standard assumptions | 2018-05-16 | Paper |
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness Designs, Codes and Cryptography | 2018-04-06 | Paper |
KDM-secure public-key encryption from constant-noise LPN | 2017-08-25 | Paper |
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks Information Security and Cryptology | 2017-05-05 | Paper |
Efficient KDM-CCA secure public-key encryption for polynomial functions Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Improved bounds on negativity of superpositions | 2013-01-28 | Paper |