| Publication | Date of Publication | Type |
|---|
| Theoretical and empirical analysis of FALCON and SOLMAE using their Python implementation | 2024-05-31 | Paper |
| Revocable Decentralized Multi-Authority Functional Encryption | 2016-12-21 | Paper |
| Improving bounds for the number of correlation immune Boolean functions | 2016-05-26 | Paper |
| Identity-based chameleon hashing and signatures without key exposure | 2016-01-14 | Paper |
| Discrete logarithm based chameleon hashing and signatures without key exposure | 2013-05-31 | Paper |
| Generic security-amplifying methods of ordinary digital signatures | 2012-10-17 | Paper |
| A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment | 2012-08-24 | Paper |
| New receipt-free voting scheme using double-trapdoor commitment | 2011-06-17 | Paper |
| Hidden attribute-based signatures without anonymity revocation | 2010-06-11 | Paper |
| Enhancements of authenticated multiple key exchange protocol based on bilinear pairings | 2010-04-07 | Paper |
| The ring authenticated encryption scheme-how to provide a clue wisely | 2009-03-24 | Paper |
| Efficient generic on-line/off-line (threshold) signatures without key exposure | 2008-11-20 | Paper |
| Generic Security-Amplifying Methods of Ordinary Digital Signatures | 2008-06-13 | Paper |
| Practical Threshold Signatures Without Random Oracles | 2008-06-10 | Paper |
| Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature | 2008-06-10 | Paper |
| A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment | 2008-05-06 | Paper |
| Mobile RFID Applications and Security Challenges | 2008-05-06 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Information Security | 2006-10-16 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Practical convertible authenticated encryption schemes using self-certified public keys | 2005-11-14 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Security of a multisignature scheme for specified group of verifiers | 2005-08-05 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| Cryptanalysis of Lee-Hwang-Li's key authentication scheme | 2005-02-22 | Paper |
| Highly reliable trust establishment scheme in ad hoc networks | 2004-11-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4452587 | 2004-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450758 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450745 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4428333 | 2003-09-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4417407 | 2003-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413339 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412993 | 2003-07-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4412977 | 2003-07-17 | Paper |
| ID-Based Blind Signature and Ring Signature from Pairings | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4788573 | 2003-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536661 | 2002-11-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536636 | 2002-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149767 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2762895 | 2002-01-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707611 | 2001-07-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721117 | 2001-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373632 | 1998-05-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341783 | 1997-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4314017 | 1995-02-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279603 | 1994-03-07 | Paper |