| Publication | Date of Publication | Type |
|---|
| Parameter-hiding order-revealing encryption without pairings | 2024-11-12 | Paper |
| Sender-anamorphic encryption reformulated: achieving robust and generic constructions | 2024-09-13 | Paper |
| Hardware acceleration of NTT-based polynomial multiplication in CRYSTALS-Kyber | 2024-07-19 | Paper |
| Secure approximate nearest neighbor search with locality-sensitive hashing | 2024-06-19 | Paper |
| Subversion-resilient signatures without random oracles | 2024-05-31 | Paper |
A lattice-based forward secure IBE scheme for Internet of things Information Sciences | 2024-03-20 | Paper |
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption | 2023-03-21 | Paper |
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy Information Security Practice and Experience | 2022-12-09 | Paper |
| Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
| Subversion-resilient public key encryption with practical watchdogs | 2021-12-21 | Paper |
Security of auditing protocols against subversion attacks International Journal of Foundations of Computer Science | 2021-04-20 | Paper |
Privacy-enhanced remote data integrity checking with updatable timestamp Information Sciences | 2021-04-19 | Paper |
Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters Information Sciences | 2020-09-22 | Paper |
Strongly leakage resilient authenticated key exchange, revisited Designs, Codes and Cryptography | 2019-11-07 | Paper |
| Asymmetric subversion attacks on signature schemes | 2018-09-26 | Paper |
| Privacy-preserving mining of association rule on outsourced cloud data from multiple parties | 2018-09-26 | Paper |
Efficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication cost Theoretical Computer Science | 2018-02-06 | Paper |
| Optimal security reductions for unique signatures: bypassing impossibilities with a counterexample | 2017-11-15 | Paper |
Strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
A note on the strong authenticated key exchange with auxiliary inputs Designs, Codes and Cryptography | 2017-09-15 | Paper |
Cryptographic reverse firewall via malleable smooth projective hash functions Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Iterated random oracle: a universal approach for finding loss in security reduction Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Oblivious keyword search with authorization Provable Security | 2017-01-06 | Paper |
Anonymous identity-based broadcast encryption with revocation for file sharing Information Security and Privacy | 2016-09-02 | Paper |
One-round strong oblivious signature-based envelope Information Security and Privacy | 2016-09-02 | Paper |
Strongly leakage-resilient authenticated key exchange Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
A new general framework for secure public key encryption with keyword search Information Security and Privacy | 2015-10-20 | Paper |