| Publication | Date of Publication | Type |
|---|
| Two-round threshold signature from algebraic one-more learning with errors | 2024-12-13 | Paper |
| Adaptively secure 5 round threshold signatures from \textsf{MLWE}/\textsf{MSIS} and \textsf{DL} with rewinding | 2024-12-13 | Paper |
| Raccoon: a masking-friendly signature proven in the probing model | 2024-12-04 | Paper |
| Breaking parallel ROS: implication for isogeny and lattice-based blind signatures | 2024-11-12 | Paper |
| Threshold raccoon: practical threshold signatures from standard lattice assumptions | 2024-11-12 | Paper |
| CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist | 2024-11-04 | Paper |
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2024-07-10 | Paper |
| Practical round-optimal blind signatures in the ROM from standard assumptions | 2024-06-26 | Paper |
| \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist | 2024-02-02 | Paper |
| A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling | 2023-06-28 | Paper |
| Group signatures and more from isogenies and lattices: generic, simple, and efficient | 2023-05-31 | Paper |
| Direct computation of branching programs and its applications to more efficient lattice-based cryptography | 2023-04-21 | Paper |
| Statistical ZAPs from group-based assumptions | 2023-03-31 | Paper |
| Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
| Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices | 2023-03-21 | Paper |
| Scalable ciphertext compression techniques for post-quantum KEMs and their applications | 2023-03-21 | Paper |
| Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
| Group signatures and more from isogenies and lattices: generic, simple, and efficient | 2022-08-30 | Paper |
| Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices | 2022-08-25 | Paper |
| An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable | 2022-05-09 | Paper |
| A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs | 2022-04-22 | Paper |
| Identity-based encryption with security against the KGC: a formal model and its instantiations | 2021-12-22 | Paper |
| An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable | 2021-12-21 | Paper |
| Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
| Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512 | 2021-12-01 | Paper |
| Non-interactive zero-knowledge in pairing-free groups from weaker assumptions | 2021-12-01 | Paper |
| Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
| Compact designated verifier NIZKs from the CDH assumption without pairings | 2021-11-24 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2021-04-07 | Paper |
| Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
| Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
| Group signatures without NIZK: from lattices in the standard model | 2020-02-04 | Paper |
| Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance | 2020-01-29 | Paper |
| Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance | 2020-01-28 | Paper |
| Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR | 2020-01-28 | Paper |
| Attribute-based signatures for unbounded languages from standard assumptions | 2019-01-23 | Paper |
| Tighter security proofs for GPV-IBE in the quantum random oracle model | 2019-01-23 | Paper |
| Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices | 2018-05-29 | Paper |
| On the untapped potential of encoding predicates by arithmetic circuits and their applications | 2018-02-23 | Paper |
| Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps | 2017-01-06 | Paper |
| Constructing Subspace Membership Encryption through Inner Product Encryption | 2015-09-29 | Paper |