| Publication | Date of Publication | Type |
|---|
| FPTRU: optimization of NTRU-prime and TLS performance assessment | 2026-01-08 | Paper |
| CPA-secure KEMS are also sufficient for post-quantum TLS 1.3 | 2025-07-03 | Paper |
Sign-then-encrypt with security enhancement and compressed ciphertext Theoretical Computer Science | 2025-01-08 | Paper |
Fully anonymous identity-based broadcast signcryption with public verification Theoretical Computer Science | 2024-03-05 | Paper |
Half-aggregation of Schnorr signatures with tight reductions Computer Security – ESORICS 2022 | 2023-07-28 | Paper |
| Tight Analysis of Decryption Failure Probability of Kyber in Reality | 2022-12-09 | Paper |
Compact Lossy and All-but-One Trapdoor Functions from Lattice Information Security Practice and Experience | 2022-12-09 | Paper |
Certificateless identity-concealed authenticated encryption under multi-KGC Information Security and Cryptology | 2022-10-14 | Paper |
Compact and Flexible KEM From Ideal Lattice IEEE Transactions on Information Theory | 2022-07-13 | Paper |
Identity-based authenticated encryption with identity confidentiality Theoretical Computer Science | 2022-01-18 | Paper |
| Number theoretic transform: generalization, optimization, concrete analysis and applications | 2021-12-08 | Paper |
| SKCN: practical and flexible digital signature from module lattice | 2021-06-08 | Paper |
Functional broadcast encryption with applications to data sharing for cloud storage Information Sciences | 2021-02-04 | Paper |
| Generic and practical key establishment from lattice | 2020-01-30 | Paper |
| Efficient tag path authentication protocol with less tag memory | 2018-12-07 | Paper |
| Cryptanalysis of RLWE-based one-pass authenticated key exchange | 2018-09-12 | Paper |
Concurrent knowledge extraction in public-key models Journal of Cryptology | 2016-04-07 | Paper |
Black-box separations of hash-and-sign signatures in the non-programmable random oracle model Provable Security | 2016-01-27 | Paper |
Security model and analysis of FHMQV, revisited Information Security and Cryptology | 2015-12-02 | Paper |
A note on the security of KHL scheme Theoretical Computer Science | 2015-09-25 | Paper |
All-but-one dual projective hashing and its applications Applied Cryptography and Network Security | 2014-07-07 | Paper |
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Accountable Authority Identity-Based Encryption with Public Traceability Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Computationally-fair group and identity-based key-exchange Lecture Notes in Computer Science | 2012-07-16 | Paper |
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
Designated confirmer signatures with unified verification Cryptography and Coding | 2011-12-16 | Paper |
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage Provable Security | 2011-09-16 | Paper |
On the security of a bidirectional proxy re-encryption scheme from PKC 2010 Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
A new framework for RFID privacy Computer Security – ESORICS 2010 | 2010-09-20 | Paper |
Concurrent knowledge extraction in the public-key model Automata, Languages and Programming | 2010-09-07 | Paper |
Deniable internet key exchange Applied Cryptography and Network Security | 2010-07-06 | Paper |
A note on the Dwork-Naor timed deniable authentication Information Processing Letters | 2010-01-29 | Paper |
| A note on the Cramer-Damgård identification scheme | 2009-03-24 | Paper |
A note on the feasibility of generalised universal composability Mathematical Structures in Computer Science | 2009-03-24 | Paper |
A note on universal composable zero-knowledge in the common reference string model Theoretical Computer Science | 2009-03-20 | Paper |
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
A Note on the Feasibility of Generalized Universal Composability Lecture Notes in Computer Science | 2007-11-13 | Paper |
A Note on Universal Composable Zero Knowledge in Common Reference String Model Lecture Notes in Computer Science | 2007-11-13 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Some variants of SAT and their properties Progress in Natural Science | 2004-03-16 | Paper |
Present random computations in a uniform way Progress in Natural Science | 2004-03-16 | Paper |
Efficient 4-round zero-knowledge proof system for NP Progress in Natural Science | 2004-03-16 | Paper |