| Publication | Date of Publication | Type |
|---|
| Bit security analysis of lattice-based KEMs under plaintext-checking attacks | 2024-10-16 | Paper |
| Post-quantum security of key encapsulation mechanism against CCA attacks with a single decapsulation query | 2024-09-13 | Paper |
| Existence and multiplicity of solutions for fractional \(p_1(x,\cdot)\& p_2(x,\cdot)\)-Laplacian Schrödinger-type equations with Robin boundary conditions | 2024-07-12 | Paper |
| On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model | 2023-05-12 | Paper |
| Generic traceable proxy re-encryption and accountable extension in consensus network | 2022-08-25 | Paper |
| Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes | 2021-12-01 | Paper |
| Lattice-based cryptosystems. A design perspective | 2020-12-07 | Paper |
| IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited | 2020-06-30 | Paper |
| Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
| Key encapsulation mechanism with explicit rejection in the quantum random oracle model | 2020-01-28 | Paper |
| On the hardness of the computational ring-LWR problem and its applications | 2018-12-20 | Paper |
| Bootstrapping fully homomorphic encryption with ring plaintexts within polynomial noise | 2018-11-07 | Paper |
| Security of the SM2 signature scheme against generalized key substitution attacks | 2018-10-26 | Paper |
| Fast lottery-based micropayments for decentralized currencies | 2018-09-26 | Paper |
| Batched multi-hop multi-key FHE from ring-LWE with compact ciphertext extension | 2018-01-19 | Paper |
| Expanded Framework for Dual System Encryption and Its Application | 2017-05-19 | Paper |
| One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model | 2017-05-05 | Paper |
| UC-secure and contributory password-authenticated group key exchange | 2016-12-21 | Paper |
| Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes | 2016-11-09 | Paper |
| Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model | 2016-03-10 | Paper |
| Generic constructions of integrated PKE and PEKS | 2016-02-19 | Paper |
| Certificateless proxy re-encryption without pairings | 2015-10-16 | Paper |
| Authenticated key exchange from ideal lattices | 2015-09-30 | Paper |
| Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol | 2015-07-16 | Paper |
| Proxy re-encryption with unforgeable re-encryption keys | 2015-02-10 | Paper |
| Black-box separations for one-more (static) CDH and its generalization | 2015-01-06 | Paper |
| PRE: stronger security notions and efficient construction with non-interactive opening | 2014-06-23 | Paper |
| Towards a secure certificateless proxy re-encryption scheme | 2013-10-23 | Paper |
| Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures | 2013-03-18 | Paper |
| A generic construction from selective-IBE to public-key encryption with non-interactive opening | 2013-01-07 | Paper |
| A ciphertext policy attribute-based encryption scheme without pairings | 2013-01-07 | Paper |
| Combined public-key schemes: the case of ABE and ABS | 2012-11-06 | Paper |
| Fully secure doubly-spatial encryption under simple assumptions | 2012-11-06 | Paper |
| Authenticated key exchange with entities from different settings and varied groups | 2012-11-06 | Paper |
| Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts | 2012-09-07 | Paper |
| Some results concerning a singular integral | 2012-02-22 | Paper |
| Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost | 2011-09-16 | Paper |
| Gateway-oriented password-authenticated key exchange protocol with stronger security | 2011-09-16 | Paper |
| Certificateless threshold ring signature | 2009-10-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610971 | 2009-03-06 | Paper |
| A New Anonymous Password-Based Authenticated Key Exchange Protocol | 2009-01-22 | Paper |
| Certificateless signature: a new security model and an improved generic construction | 2007-09-20 | Paper |
| Key Replacement Attack Against a Generic Construction of Certificateless Signature | 2007-09-07 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Cryptanalysis of AW digital signature scheme based on error-correcting codes | 2007-02-20 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Analysis and improvement of a security-provable mutually authenticated key agreement | 2006-10-10 | Paper |
| An additive problem with primes in arithmetic progressions | 2006-01-09 | Paper |
| Cryptanalysis of some signature schemes with message recovery | 2005-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823929 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823630 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434314 | 2004-01-26 | Paper |
| The ternary Goldbach problem with primes in arithmetic progressions | 2002-04-16 | Paper |