| Publication | Date of Publication | Type |
|---|
| Sign-then-encrypt with security enhancement and compressed ciphertext | 2025-01-08 | Paper |
| Fully anonymous identity-based broadcast signcryption with public verification | 2024-03-05 | Paper |
| Half-aggregation of Schnorr signatures with tight reductions | 2023-07-28 | Paper |
| Compact Lossy and All-but-One Trapdoor Functions from Lattice | 2022-12-09 | Paper |
| Tight Analysis of Decryption Failure Probability of Kyber in Reality | 2022-12-09 | Paper |
| Certificateless identity-concealed authenticated encryption under multi-KGC | 2022-10-14 | Paper |
| Compact and Flexible KEM From Ideal Lattice | 2022-07-13 | Paper |
| Identity-based authenticated encryption with identity confidentiality | 2022-01-18 | Paper |
| Number theoretic transform: generalization, optimization, concrete analysis and applications | 2021-12-08 | Paper |
| SKCN: practical and flexible digital signature from module lattice | 2021-06-08 | Paper |
| Functional broadcast encryption with applications to data sharing for cloud storage | 2021-02-04 | Paper |
| Generic and practical key establishment from lattice | 2020-01-30 | Paper |
| Efficient tag path authentication protocol with less tag memory | 2018-12-07 | Paper |
| Cryptanalysis of RLWE-based one-pass authenticated key exchange | 2018-09-12 | Paper |
| Concurrent knowledge extraction in public-key models | 2016-04-07 | Paper |
| Black-box separations of hash-and-sign signatures in the non-programmable random oracle model | 2016-01-27 | Paper |
| Security model and analysis of FHMQV, revisited | 2015-12-02 | Paper |
| A note on the security of KHL scheme | 2015-09-25 | Paper |
| All-but-one dual projective hashing and its applications | 2014-07-07 | Paper |
| Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack | 2014-05-27 | Paper |
| Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks | 2013-03-18 | Paper |
| Accountable Authority Identity-Based Encryption with Public Traceability | 2013-03-18 | Paper |
| Computationally-fair group and identity-based key-exchange | 2012-07-16 | Paper |
| Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
| Designated confirmer signatures with unified verification | 2011-12-16 | Paper |
| Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage | 2011-09-16 | Paper |
| On the security of a bidirectional proxy re-encryption scheme from PKC 2010 | 2011-03-15 | Paper |
| A new framework for RFID privacy | 2010-09-20 | Paper |
| Concurrent knowledge extraction in the public-key model | 2010-09-07 | Paper |
| Deniable internet key exchange | 2010-07-06 | Paper |
| A note on the Dwork-Naor timed deniable authentication | 2010-01-29 | Paper |
| A note on the feasibility of generalised universal composability | 2009-03-24 | Paper |
| A note on the Cramer-Damgård identification scheme | 2009-03-24 | Paper |
| A note on universal composable zero-knowledge in the common reference string model | 2009-03-20 | Paper |
| Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model | 2007-11-29 | Paper |
| A Note on the Feasibility of Generalized Universal Composability | 2007-11-13 | Paper |
| A Note on Universal Composable Zero Knowledge in Common Reference String Model | 2007-11-13 | Paper |
| Theory of Cryptography | 2007-02-12 | Paper |
| Some variants of SAT and their properties | 2004-03-16 | Paper |
| Present random computations in a uniform way | 2004-03-16 | Paper |
| Efficient 4-round zero-knowledge proof system for NP | 2004-03-16 | Paper |