| Publication | Date of Publication | Type |
|---|
| Bit security analysis of lattice-based KEMs under plaintext-checking attacks | 2024-10-16 | Paper |
| Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query | 2024-09-13 | Paper |
| Existence and multiplicity of solutions for fractional \(p_1(x,\cdot)\& p_2(x,\cdot)\)-Laplacian Schrödinger-type equations with Robin boundary conditions | 2024-07-12 | Paper |
| On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model | 2023-05-12 | Paper |
| Generic traceable proxy re-encryption and accountable extension in consensus network | 2022-08-25 | Paper |
| Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes | 2021-12-01 | Paper |
| Lattice-Based Cryptosystems | 2020-12-07 | Paper |
| IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited | 2020-06-30 | Paper |
| Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
| Key encapsulation mechanism with explicit rejection in the quantum random oracle model | 2020-01-28 | Paper |
| On the hardness of the computational ring-LWR problem and its applications | 2018-12-20 | Paper |
| Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise | 2018-11-07 | Paper |
| Security of the SM2 signature scheme against generalized key substitution attacks | 2018-10-26 | Paper |
| Fast lottery-based micropayments for decentralized currencies | 2018-09-26 | Paper |
| Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension | 2018-01-19 | Paper |
| Expanded Framework for Dual System Encryption and Its Application | 2017-05-19 | Paper |
| One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model | 2017-05-05 | Paper |
| UC-secure and Contributory Password-Authenticated Group Key Exchange | 2016-12-21 | Paper |
| Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes | 2016-11-09 | Paper |
| Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model | 2016-03-10 | Paper |
| Generic constructions of integrated PKE and PEKS | 2016-02-19 | Paper |
| Certificateless Proxy Re-Encryption Without Pairings | 2015-10-16 | Paper |
| Authenticated Key Exchange from Ideal Lattices | 2015-09-30 | Paper |
| Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol | 2015-07-16 | Paper |
| Proxy Re-encryption with Unforgeable Re-encryption Keys | 2015-02-10 | Paper |
| Black-Box Separations for One-More (Static) CDH and Its Generalization | 2015-01-06 | Paper |
| PRE: stronger security notions and efficient construction with non-interactive opening | 2014-06-23 | Paper |
| Towards a Secure Certificateless Proxy Re-Encryption Scheme | 2013-10-23 | Paper |
| Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures | 2013-03-18 | Paper |
| A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening | 2013-01-07 | Paper |
| A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings | 2013-01-07 | Paper |
| Combined Public-Key Schemes: The Case of ABE and ABS | 2012-11-06 | Paper |
| Fully Secure Doubly-Spatial Encryption under Simple Assumptions | 2012-11-06 | Paper |
| Authenticated Key Exchange with Entities from Different Settings and Varied Groups | 2012-11-06 | Paper |
| Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts | 2012-09-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3116378 | 2012-02-22 | Paper |
| Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost | 2011-09-16 | Paper |
| Gateway-Oriented Password-Authenticated Key Exchange Protocol with Stronger Security | 2011-09-16 | Paper |
| Certificateless threshold ring signature | 2009-10-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610971 | 2009-03-06 | Paper |
| A New Anonymous Password-Based Authenticated Key Exchange Protocol | 2009-01-22 | Paper |
| Certificateless signature: a new security model and an improved generic construction | 2007-09-20 | Paper |
| Key Replacement Attack Against a Generic Construction of Certificateless Signature | 2007-09-07 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Cryptanalysis of AW digital signature scheme based on error-correcting codes | 2007-02-20 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5491195 | 2006-10-10 | Paper |
| An additive problem with primes in arithmetic progressions | 2006-01-09 | Paper |
| Cryptanalysis of some signature schemes with message recovery | 2005-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823929 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823630 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434314 | 2004-01-26 | Paper |
| The ternary Goldbach problem with primes in arithmetic progressions | 2002-04-16 | Paper |