| Publication | Date of Publication | Type |
|---|
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
Forward-secure public key encryption without key update from proof-of-stake blockchain Lecture Notes in Computer Science | 2023-05-12 | Paper |
Maliciously circuit-private multi-key FHE and MPC based on LWE Designs, Codes and Cryptography | 2023-04-28 | Paper |
On Private Information Retrieval Supporting Range Queries 1511.68044 | 2022-12-22 | Paper |
| Efficient two-party exponentiation from quotient transfer | 2022-11-09 | Paper |
| Field extension in secret-shared form and its applications to efficient secure computation | 2020-05-27 | Paper |
| Token-based multi-input functional encryption | 2018-11-07 | Paper |
| Secure multi-party computation using polarizing cards | 2018-10-24 | Paper |
Statistical attacks on cookie masking for RC4 Cryptography and Communications | 2018-05-28 | Paper |
| Related randomness security for public key encryption, revisited | 2018-05-16 | Paper |
Backdoors in pseudorandom number generators: possibility and impossibility results Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency Theoretical Computer Science | 2016-05-02 | Paper |
Multi-party computation with small shuffle complexity using regular polygon cards Provable Security | 2016-01-27 | Paper |
Security Against Related Randomness Attacks via Reconstructive Extractors Cryptography and Coding | 2016-01-12 | Paper |
Dynamic threshold public-key encryption with decryption consistency from static assumptions Information Security and Privacy | 2015-10-20 | Paper |
Plaintext Recovery Attacks Against WPA/TKIP Fast Software Encryption | 2015-09-18 | Paper |
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) Lecture Notes in Computer Science | 2015-01-16 | Paper |
Related randomness attacks for public key encryption Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups Lecture Notes in Computer Science | 2012-09-25 | Paper |
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
On the joint security of encryption and signature, revisited Lecture Notes in Computer Science | 2011-12-02 | Paper |
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks Applied Cryptography and Network Security | 2011-06-28 | Paper |
Wildcarded identity-based encryption Journal of Cryptology | 2011-04-01 | Paper |
On-line non-transferable signatures revisited Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Efficient constructions of signcryption schemes and signcryption composability Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards Information Security and Privacy | 2009-03-06 | Paper |
Proxy Signatures Secure Against Proxy Key Exposure Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Efficient Identity-Based Signatures Secure in the Standard Model Information Security and Privacy | 2007-09-07 | Paper |