Publication | Date of Publication | Type |
---|
Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection | 2023-08-16 | Paper |
Dynamic random probing expansion with quasi linear asymptotic complexity | 2023-05-12 | Paper |
Succinct Diophantine-satisfiability arguments | 2023-03-29 | Paper |
Public-key generation with verifiable randomness | 2023-03-21 | Paper |
Secure storage -- confidentiality and authentication | 2022-09-16 | Paper |
Reusing nonces in Schnorr signatures (and keeping it secure...) | 2022-08-25 | Paper |
The key-dependent message security of key-alternating Feistel ciphers | 2021-12-20 | Paper |
Hardware security without secure hardware: how to decrypt with a password and a server | 2021-11-18 | Paper |
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND | 2021-03-30 | Paper |
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions | 2021-02-01 | Paper |
Speeding-up verification of digital signatures | 2021-01-22 | Paper |
Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures | 2020-06-24 | Paper |
Inferring sequences produced by elliptic curve generators using Coppersmith's methods | 2020-05-26 | Paper |
Lower and upper bounds on the randomness complexity of private computations of AND | 2020-04-30 | Paper |
Analysis and improvement of an authentication scheme in incremental cryptography | 2019-02-20 | Paper |
Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions | 2019-01-11 | Paper |
Lattice attacks on pairing-based signatures | 2018-04-20 | Paper |
Lattice attacks against elliptic-curve signatures with blinded scalar multiplication | 2018-02-16 | Paper |
Practical key recovery for discrete-logarithm based authentication schemes from random nonce bits | 2018-02-14 | Paper |
Private multiplication over finite fields | 2017-10-27 | Paper |
Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption | 2017-07-27 | Paper |
Polynomial interpolation of the Naor-Reingold pseudo-random function | 2017-07-19 | Paper |
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys | 2017-07-12 | Paper |
Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function | 2017-06-13 | Paper |
Full Disk Encryption: Bridging Theory and Practice | 2017-04-12 | Paper |
Randomness Complexity of Private Circuits for Multiplication | 2016-07-15 | Paper |
Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou | 2016-04-18 | Paper |
Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness | 2016-04-13 | Paper |
Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions | 2016-04-08 | Paper |
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks | 2016-03-10 | Paper |
Non-Interactive Zero-Knowledge Proofs of Non-Membership | 2016-03-02 | Paper |
Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes | 2014-01-24 | Paper |
New Techniques for SPHFs and Efficient One-Round PAKE Protocols | 2013-09-02 | Paper |
Time/Memory/Data Tradeoffs for Variants of the RSA Problem | 2013-06-11 | Paper |
Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages | 2013-04-19 | Paper |
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions | 2013-04-04 | Paper |
Enumeration formula for \((2,n)\)-cubes in discrete planes | 2012-10-26 | Paper |
Compact Round-Optimal Partially-Blind Signatures | 2012-09-25 | Paper |
Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods | 2012-07-20 | Paper |
Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions | 2012-06-15 | Paper |
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes | 2011-12-16 | Paper |
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security | 2011-12-02 | Paper |
Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform | 2011-06-29 | Paper |
Signatures on Randomizable Ciphertexts | 2011-03-15 | Paper |
Huff’s Model for Elliptic Curves | 2010-09-29 | Paper |
Mediated Traceable Anonymous Encryption | 2010-08-31 | Paper |
Time-selective convertible undeniable signatures with short conversion receipts | 2010-07-20 | Paper |
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption | 2010-07-06 | Paper |
Batch Groth–Sahai | 2010-07-06 | Paper |
Fair Blind Signatures without Random Oracles | 2010-05-04 | Paper |
Multi-designated verifiers signatures: anonymity without encryption | 2010-01-29 | Paper |
Provably Secure Code-Based Threshold Ring Signatures | 2010-01-07 | Paper |
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model | 2009-11-26 | Paper |
Linear independence measure for squares of periods and quasi-periods of elliptic curves | 2009-05-28 | Paper |
Adaptive-ID Secure Revocable Identity-Based Encryption | 2009-04-29 | Paper |
NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES | 2009-04-14 | Paper |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys | 2009-03-24 | Paper |
Gradually Convertible Undeniable Signatures | 2009-03-10 | Paper |
Tracing Malicious Proxies in Proxy Re-encryption | 2009-02-10 | Paper |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures | 2008-06-24 | Paper |
Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems | 2008-06-24 | Paper |
Separation Results on the “One-More” Computational Problems | 2008-04-24 | Paper |
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log | 2008-03-18 | Paper |
Universally Convertible Directed Signatures | 2008-03-18 | Paper |
Short Undeniable Signatures Without Random Oracles: The Missing Link | 2008-03-17 | Paper |
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption | 2008-03-05 | Paper |
On Kabatianskii-Krouk-Smeets Signatures | 2007-11-15 | Paper |
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures | 2007-09-11 | Paper |
Coding and Cryptography | 2007-05-02 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
Universal forgery on Sekhar's signature scheme with message recovery | 2005-02-28 | Paper |