| Publication | Date of Publication | Type |
|---|
| Bit security analysis of lattice-based KEMs under plaintext-checking attacks | 2024-10-16 | Paper |
| Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query | 2024-09-13 | Paper |
Existence and multiplicity of solutions for fractional \(p_1(x,\cdot)\& p_2(x,\cdot)\)-Laplacian Schrödinger-type equations with Robin boundary conditions Boundary Value Problems | 2024-07-12 | Paper |
On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Generic traceable proxy re-encryption and accountable extension in consensus network | 2022-08-25 | Paper |
| Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes | 2021-12-01 | Paper |
| Lattice-based cryptosystems. A design perspective | 2020-12-07 | Paper |
| IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited | 2020-06-30 | Paper |
| Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
| Key encapsulation mechanism with explicit rejection in the quantum random oracle model | 2020-01-28 | Paper |
| On the hardness of the computational ring-LWR problem and its applications | 2018-12-20 | Paper |
| Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise | 2018-11-07 | Paper |
| Security of the SM2 signature scheme against generalized key substitution attacks | 2018-10-26 | Paper |
| Fast lottery-based micropayments for decentralized currencies | 2018-09-26 | Paper |
| Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension | 2018-01-19 | Paper |
Expanded Framework for Dual System Encryption and Its Application Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model Information Security and Cryptology | 2017-05-05 | Paper |
UC-secure and contributory password-authenticated group key exchange Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model Applied Cryptography and Network Security | 2016-03-10 | Paper |
Generic constructions of integrated PKE and PEKS Designs, Codes and Cryptography | 2016-02-19 | Paper |
Certificateless proxy re-encryption without pairings Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Authenticated key exchange from ideal lattices Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol Nonlinear Dynamics | 2015-07-16 | Paper |
Proxy re-encryption with unforgeable re-encryption keys Cryptology and Network Security | 2015-02-10 | Paper |
Black-box separations for one-more (static) CDH and its generalization Lecture Notes in Computer Science | 2015-01-06 | Paper |
PRE: stronger security notions and efficient construction with non-interactive opening Theoretical Computer Science | 2014-06-23 | Paper |
Towards a secure certificateless proxy re-encryption scheme Provable Security | 2013-10-23 | Paper |
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
A generic construction from selective-IBE to public-key encryption with non-interactive opening Information Security and Cryptology | 2013-01-07 | Paper |
A ciphertext policy attribute-based encryption scheme without pairings Information Security and Cryptology | 2013-01-07 | Paper |
Combined public-key schemes: the case of ABE and ABS Provable Security | 2012-11-06 | Paper |
Fully secure doubly-spatial encryption under simple assumptions Provable Security | 2012-11-06 | Paper |
Authenticated key exchange with entities from different settings and varied groups Provable Security | 2012-11-06 | Paper |
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts Information Security and Privacy | 2012-09-07 | Paper |
| Some results concerning a singular integral | 2012-02-22 | Paper |
Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost Provable Security | 2011-09-16 | Paper |
Gateway-oriented password-authenticated key exchange protocol with stronger security Provable Security | 2011-09-16 | Paper |
Certificateless threshold ring signature Information Sciences | 2009-10-01 | Paper |
| scientific article; zbMATH DE number 5525620 (Why is no real title available?) | 2009-03-06 | Paper |
A New Anonymous Password-Based Authenticated Key Exchange Protocol Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Certificateless signature: a new security model and an improved generic construction Designs, Codes and Cryptography | 2007-09-20 | Paper |
Key Replacement Attack Against a Generic Construction of Certificateless Signature Information Security and Privacy | 2007-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Cryptanalysis of AW digital signature scheme based on error-correcting codes Science in China. Series F | 2007-02-20 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
| Analysis and improvement of a security-provable mutually authenticated key agreement | 2006-10-10 | Paper |
An additive problem with primes in arithmetic progressions Acta Mathematica Sinica, English Series | 2006-01-09 | Paper |
Cryptanalysis of some signature schemes with message recovery Applied Mathematics and Computation | 2005-11-14 | Paper |
| scientific article; zbMATH DE number 2112427 (Why is no real title available?) | 2004-10-28 | Paper |
| scientific article; zbMATH DE number 2112170 (Why is no real title available?) | 2004-10-28 | Paper |
| scientific article; zbMATH DE number 2001304 (Why is no real title available?) | 2004-01-26 | Paper |
The ternary Goldbach problem with primes in arithmetic progressions Acta Mathematica Sinica, English Series | 2002-04-16 | Paper |