| Publication | Date of Publication | Type |
|---|
| Multi-user dynamic searchable encryption for prefix-fixing predicates from symmetric-key primitives | 2025-06-17 | Paper |
| Achieving pairing-free aggregate signatures using pre-communication between signers | 2023-03-21 | Paper |
| Efficient private PEZ protocols for symmetric functions | 2020-04-30 | Paper |
| Probabilistic generation of trapdoors: reducing information leakage of searchable symmetric encryption | 2018-10-26 | Paper |
| Efficient card-based cryptographic protocols for millionaires' problem utilizing private permutations | 2018-10-26 | Paper |
| Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes | 2018-10-24 | Paper |
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography IEEE Transactions on Information Theory | 2018-06-27 | Paper |
| Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations | 2018-03-16 | Paper |
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency Theoretical Computer Science | 2016-05-02 | Paper |
Dynamic threshold public-key encryption with decryption consistency from static assumptions Information Security and Privacy | 2015-10-20 | Paper |
Improved Indifferentiable Security Analysis of PHOTON Lecture Notes in Computer Science | 2014-10-14 | Paper |
Factorization of Square-Free Integers with High Bits Known Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
How to construct sufficient conditions for hash functions Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Reset indifferentiability from weakened random oracle salvages one-pass hash functions Applied Cryptography and Network Security | 2014-07-07 | Paper |
Constant rounds almost linear complexity multi-party computation for prefix sum Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher Lecture Notes in Computer Science | 2013-06-04 | Paper |
An extension of fault sensitivity analysis based on clockwise collision Information Security and Cryptology | 2013-05-28 | Paper |
Boomerang distinguishers for full HAS-160 compression function Advances in Information and Computer Security | 2013-04-04 | Paper |
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function Advances in Information and Computer Security | 2013-04-04 | Paper |
Three-subset meet-in-the-middle attack on reduced XTEA Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
New truncated differential cryptanalysis on 3D block cipher Information Security Practice and Experience | 2012-06-29 | Paper |
Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting Cryptography and Coding | 2011-12-16 | Paper |
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity Advances in Information and Computer Security | 2011-11-10 | Paper |
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model Provable Security | 2011-09-16 | Paper |
Rigorous security requirements for designated verifier signatures Information Security and Cryptology | 2011-07-29 | Paper |
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
How to confirm cryptosystems security: the original Merkle-Damgård is still alive! Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Bit-Free Collision: Application to APOP Attack Advances in Information and Computer Security | 2009-10-28 | Paper |
Fault Analysis Attack against an AES Prototype Chip Using RSL Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
A New Strategy for Finding a Differential Path of SHA-1 Information Security and Privacy | 2009-03-06 | Paper |
Sanitizable and Deletable Signature Information Security Applications | 2009-02-24 | Paper |
Leaky Random Oracle (Extended Abstract) Provable Security | 2009-01-27 | Paper |
New Message Difference for MD4 Fast Software Encryption | 2008-09-16 | Paper |
Provably Secure Electronic Cash Based on Blind Multisignature Schemes Financial Cryptography and Data Security | 2008-09-09 | Paper |
Formal Security Model of Multisignatures Lecture Notes in Computer Science | 2008-06-17 | Paper |
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures Applied Cryptography and Network Security | 2008-06-13 | Paper |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Improved Collision Search for SHA-0 Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
A quantum algorithm using NMR computers to break secret-key cryptosystems New Generation Computing | 2004-09-22 | Paper |
| scientific article; zbMATH DE number 1406762 (Why is no real title available?) | 2000-03-01 | Paper |
| scientific article; zbMATH DE number 1304124 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1304286 (Why is no real title available?) | 1999-10-06 | Paper |
| scientific article; zbMATH DE number 1302859 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1107693 (Why is no real title available?) | 1998-02-16 | Paper |
A practical secret voting scheme for large scale elections Advances in Cryptology — AUSCRYPT '92 | 1998-01-14 | Paper |
| scientific article; zbMATH DE number 1030989 (Why is no real title available?) | 1997-08-24 | Paper |
| scientific article; zbMATH DE number 1024057 (Why is no real title available?) | 1997-06-18 | Paper |
| scientific article; zbMATH DE number 697816 (Why is no real title available?) | 1995-11-28 | Paper |
| scientific article; zbMATH DE number 697807 (Why is no real title available?) | 1994-11-30 | Paper |
How to Utilize the Randomness of Zero-Knowledge Proofs Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings | 1994-03-07 | Paper |
| scientific article; zbMATH DE number 503348 (Why is no real title available?) | 1994-02-22 | Paper |
| scientific article; zbMATH DE number 177045 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 176549 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177055 (Why is no real title available?) | 1993-05-18 | Paper |
Universal Electronic Cash Advances in Cryptology — CRYPTO ’91 | 1993-05-18 | Paper |
Interactive Bi-Proof Systems and Undeniable Signature Schemes Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
Direct Zero Knowledge Proofs of Computational Power in Five Rounds Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 4172376 (Why is no real title available?) | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4211487 (Why is no real title available?) | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4191110 (Why is no real title available?) | 1990-01-01 | Paper |