| Publication | Date of Publication | Type |
|---|
| Exponential quantum one-wayness and EFI pairs | 2025-01-10 | Paper |
| Quantum advantage from one-way functions | 2024-12-13 | Paper |
| Quantum complexity for discrete logarithms and related problems | 2024-12-13 | Paper |
| Unconditionally secure commitments with quantum auxiliary inputs | 2024-12-13 | Paper |
| Quantum public-key encryption with tamper-resilient public keys from one-way functions | 2024-12-13 | Paper |
| Certified everlasting secure collusion-resistant functional encryption, and more | 2024-11-13 | Paper |
| Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness | 2024-10-11 | Paper |
| Proofs of quantumness from trapdoor permutations | 2024-09-25 | Paper |
| Publicly verifiable deletion from minimal assumptions | 2024-08-15 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2024-07-10 | Paper |
| Dynamical aspects of excitonic Floquet states generated by a phase-locked mid-infrared pulse in a one-dimensional Mott insulator | 2024-06-21 | Paper |
| Obfuscation of pseudo-deterministic quantum circuits | 2024-05-08 | Paper |
| Public key encryption with secure key leasing | 2024-01-16 | Paper |
| From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments | 2024-01-16 | Paper |
| Classically verifiable NIZK for QMA with preprocessing | 2023-08-21 | Paper |
| Bounded functional encryption for Turing machines: adaptive security from general assumptions | 2023-08-14 | Paper |
| NIZK from SNARGs | 2023-07-05 | Paper |
| Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round | 2023-06-30 | Paper |
| Quantum commitments and signatures without one-way functions | 2023-06-12 | Paper |
| Certified everlasting zero-knowledge proof for QMA | 2023-06-12 | Paper |
| Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication | 2023-05-12 | Paper |
| Secure software leasing from standard assumptions | 2023-03-31 | Paper |
| Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
| Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness | 2023-03-21 | Paper |
| Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
| A black-box approach to post-quantum zero-knowledge in constant rounds | 2022-03-31 | Paper |
| Classical verification of quantum computations with efficient verifier | 2022-03-23 | Paper |
| Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
| Classical vs quantum random oracles | 2021-12-08 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
| NIZK from SNARG | 2021-12-01 | Paper |
| Compact designated verifier NIZKs from the CDH assumption without pairings | 2021-11-24 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2021-04-07 | Paper |
| Quantum random oracle model with auxiliary input | 2020-05-20 | Paper |
| Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
| Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
| Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
| (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
| Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
| Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
| Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio | 2020-01-28 | Paper |
| On the analytical solution for the Pütter-Bertalanffy growth equation | 2019-05-14 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2019-01-23 | Paper |
| Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
| Tightly-secure key-encapsulation mechanism in the quantum random oracle model | 2018-07-17 | Paper |
| Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
| Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli | 2016-10-27 | Paper |
| Generalized hardness assumption for self-bilinear map with auxiliary information | 2016-09-02 | Paper |
| A short fail-stop signature scheme from factoring | 2015-09-29 | Paper |
| Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues | 2014-10-14 | Paper |
| Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2014-08-07 | Paper |