| Publication | Date of Publication | Type |
|---|
| Cryptanalysis of a generalized subset-sum pseudorandom generator | 2024-12-03 | Paper |
| Quantum security of subset cover problems | 2024-11-22 | Paper |
| Commitments with efficient zero-knowledge arguments from subset sum problems | 2024-06-05 | Paper |
| Efficient zero-knowledge arguments and digital signatures \textit{via} sharing conversion \textit{in the head} | 2024-06-05 | Paper |
| Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection | 2023-08-16 | Paper |
| Dynamic random probing expansion with quasi linear asymptotic complexity | 2023-05-12 | Paper |
| Succinct Diophantine-satisfiability arguments | 2023-03-29 | Paper |
| Public-key generation with verifiable randomness | 2023-03-21 | Paper |
| Secure storage -- confidentiality and authentication | 2022-09-16 | Paper |
| Reusing nonces in Schnorr signatures (and keeping it secure...) | 2022-08-25 | Paper |
| The key-dependent message security of key-alternating Feistel ciphers | 2021-12-20 | Paper |
| Hardware security without secure hardware: how to decrypt with a password and a server | 2021-11-18 | Paper |
| Lower and upper bounds on the randomness complexity of private computations of AND | 2021-03-30 | Paper |
| Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions | 2021-02-01 | Paper |
| Speeding-up verification of digital signatures | 2021-01-22 | Paper |
| Generalized polynomial decomposition for S-boxes with application to side-channel countermeasures | 2020-06-24 | Paper |
| Inferring sequences produced by elliptic curve generators using Coppersmith's methods | 2020-05-26 | Paper |
| Lower and upper bounds on the randomness complexity of private computations of AND | 2020-04-30 | Paper |
| Analysis and improvement of an authentication scheme in incremental cryptography | 2019-02-20 | Paper |
| Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions | 2019-01-11 | Paper |
| Lattice attacks on pairing-based signatures | 2018-04-20 | Paper |
| Lattice attacks against elliptic-curve signatures with blinded scalar multiplication | 2018-02-16 | Paper |
| Practical key recovery for discrete-logarithm based authentication schemes from random nonce bits | 2018-02-14 | Paper |
| Private multiplication over finite fields | 2017-10-27 | Paper |
| Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption | 2017-07-27 | Paper |
| Polynomial interpolation of the Naor-Reingold pseudo-random function | 2017-07-19 | Paper |
| Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys | 2017-07-12 | Paper |
| Distribution and polynomial interpolation of the Dodis-Yampolskiy pseudo-random function | 2017-06-13 | Paper |
| Full disk encryption: bridging theory and practice | 2017-04-12 | Paper |
| Randomness complexity of private circuits for multiplication | 2016-07-15 | Paper |
| Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou | 2016-04-18 | Paper |
| Easing Coppersmith methods using analytic combinatorics: applications to public-key cryptography with weak pseudorandomness | 2016-04-13 | Paper |
| Mitigating server breaches in password-based authentication: secure and efficient solutions | 2016-04-08 | Paper |
| Robust pseudo-random number generators with input secure against side-channel attacks | 2016-03-10 | Paper |
| Non-Interactive Zero-Knowledge Proofs of Non-Membership | 2016-03-02 | Paper |
| Analysis and improvement of Lindell's UC-secure commitment schemes | 2014-01-24 | Paper |
| New techniques for SPHFs and efficient one-round PAKE protocols | 2013-09-02 | Paper |
| Time/memory/data tradeoffs for variants of the RSA problem | 2013-06-11 | Paper |
| Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages | 2013-04-19 | Paper |
| Genus 2 hyperelliptic curve families with explicit Jacobian order evaluation and pairing-friendly constructions | 2013-04-04 | Paper |
| Enumeration formula for \((2,n)\)-cubes in discrete planes | 2012-10-26 | Paper |
| Compact Round-Optimal Partially-Blind Signatures | 2012-09-25 | Paper |
| Inferring sequences produced by nonlinear pseudorandom number generators using Coppersmith's methods | 2012-07-20 | Paper |
| Round-optimal privacy-preserving protocols with smooth projective hash functions | 2012-06-15 | Paper |
| Block-wise P-signatures and non-interactive anonymous credentials with efficient attributes | 2011-12-16 | Paper |
| Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security | 2011-12-02 | Paper |
| Efficient and secure generalized pattern matching via Fast Fourier Transform | 2011-06-29 | Paper |
| Signatures on randomizable ciphertexts | 2011-03-15 | Paper |
| Huff's model for elliptic curves | 2010-09-29 | Paper |
| Mediated traceable anonymous encryption | 2010-08-31 | Paper |
| Time-selective convertible undeniable signatures with short conversion receipts | 2010-07-20 | Paper |
| Batch Groth-Sahai | 2010-07-06 | Paper |
| On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption | 2010-07-06 | Paper |
| Fair blind signatures without random oracles | 2010-05-04 | Paper |
| Multi-designated verifiers signatures: anonymity without encryption | 2010-01-29 | Paper |
| Provably Secure Code-Based Threshold Ring Signatures | 2010-01-07 | Paper |
| Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model | 2009-11-26 | Paper |
| Linear independence measure for squares of periods and quasi-periods of elliptic curves | 2009-05-28 | Paper |
| Adaptive-ID Secure Revocable Identity-Based Encryption | 2009-04-29 | Paper |
| NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES | 2009-04-14 | Paper |
| Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys | 2009-03-24 | Paper |
| Gradually Convertible Undeniable Signatures | 2009-03-10 | Paper |
| Tracing Malicious Proxies in Proxy Re-encryption | 2009-02-10 | Paper |
| On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures | 2008-06-24 | Paper |
| Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems | 2008-06-24 | Paper |
| Separation Results on the “One-More” Computational Problems | 2008-04-24 | Paper |
| Universally Convertible Directed Signatures | 2008-03-18 | Paper |
| Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log | 2008-03-18 | Paper |
| Short Undeniable Signatures Without Random Oracles: The Missing Link | 2008-03-17 | Paper |
| Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption | 2008-03-05 | Paper |
| On Kabatianskii-Krouk-Smeets Signatures | 2007-11-15 | Paper |
| New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures | 2007-09-11 | Paper |
| Coding and Cryptography | 2007-05-02 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Universal forgery on Sekhar's signature scheme with message recovery | 2005-02-28 | Paper |