| Publication | Date of Publication | Type |
|---|
Hybrid zero-knowledge from garbled circuits and circuit-based composition of \(\Sigma \)-protocols | 2025-01-10 | Paper |
CDS composition of multi-round protocols | 2024-12-13 | Paper |
Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme | 2024-11-12 | Paper |
Mechanism of common-mode noise and heat generation in an Electric circuit with grounding using multiconductor transmission-line theory Chinese Journal of Physics (Taipei) | 2024-03-04 | Paper |
Quantum-access security of hash-based signature schemes | 2024-01-11 | Paper |
Compact structure-preserving signatures with almost tight security Journal of Cryptology | 2023-08-22 | Paper |
Acyclicity programming for sigma-protocols | 2023-03-31 | Paper |
Non-interactive composition of sigma-protocols via Share-then-Hash | 2023-03-29 | Paper |
On black-box extensions of non-interactive zero-knowledge arguments, and signatures directly from simulation soundness Lecture Notes in Computer Science | 2022-10-13 | Paper |
Blind key-generation attribute-based encryption for general predicates Designs, Codes and Cryptography | 2022-09-22 | Paper |
On black-box extension of a non-interactive zero-knowledge proof system for secret equality | 2022-07-06 | Paper |
On subset-resilient hash function families Designs, Codes and Cryptography | 2022-03-21 | Paper |
Shorter QA-NIZK and SPS with tighter security | 2020-05-11 | Paper |
A coin-free oracle-based augmented black box framework | 2020-01-10 | Paper |
Efficient fully structure-preserving signatures and shrinking commitments Journal of Cryptology | 2019-08-13 | Paper |
On the impossibility of structure-preserving deterministic primitives Journal of Cryptology | 2019-01-29 | Paper |
Improved (almost) tightly-secure simulation-sound QA-NIZK with applications | 2018-12-20 | Paper |
Efficient functional encryption for inner-product values with full-hiding security | 2018-10-18 | Paper |
Lower bounds on structure-preserving signatures for bilateral messages | 2018-10-17 | Paper |
Compact structure-preserving signatures with almost tight security | 2017-11-15 | Paper |
Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming Advances in Cryptology – CRYPTO 2016 | 2016-11-09 | Paper |
Constant-size structure-preserving signatures: generic constructions and simple assumptions Journal of Cryptology | 2016-10-13 | Paper |
Structure-preserving signatures and commitments to group elements Journal of Cryptology | 2016-06-01 | Paper |
Fully structure-preserving signatures and shrinking commitments Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Packing messages and optimizing bootstrapping in GSW-FHE Lecture Notes in Computer Science | 2015-08-27 | Paper |
On the definition of anonymity for ring signatures Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Structure-preserving signatures from type II pairings Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Converting cryptographic schemes from symmetric to asymmetric bilinear groups Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures Theory of Cryptography | 2014-02-18 | Paper |
On the impossibility of structure-preserving deterministic primitives Theory of Cryptography | 2014-02-18 | Paper |
Tagged one-time signatures: tight security and optimal tag size Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Constant-size structure-preserving signatures: generic constructions and simple assumptions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
A framework for universally composable non-committing blind signatures International Journal of Applied Cryptography | 2012-11-16 | Paper |
Tools over bilinear groups for modular design of cryptographic tasks. (Abstract) Provable Security | 2012-11-06 | Paper |
Group to group commitments do not shrink Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions Lecture Notes in Computer Science | 2011-12-02 | Paper |
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
A signature scheme with efficient proof of validity Lecture Notes in Computer Science | 2011-06-08 | Paper |
Structure-preserving signatures and commitments to group elements Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Efficient hybrid encryption from ID-based encryption Designs, Codes and Cryptography | 2010-03-02 | Paper |
A Framework for Universally Composable Non-committing Blind Signatures Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Compact CCA-Secure Encryption for Messages of Arbitrary Length Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Chosen Ciphertext Security with Optimal Ciphertext Overhead Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM Lecture Notes in Computer Science | 2008-05-06 | Paper |
Tag-KEM/DEM: A new framework for hybrid encryption Journal of Cryptology | 2008-04-16 | Paper |
Tag-KEM from Set Partial Domain One-Way Permutations Information Security and Privacy | 2007-09-07 | Paper |
Perfect NIZK with Adaptive Soundness Theory of Cryptography | 2007-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Combining Encryption and Proof of Knowledge in the Random Oracle Model The Computer Journal | 2004-11-19 | Paper |
scientific article; zbMATH DE number 2085425 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2081088 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2079934 (Why is no real title available?) | 2004-08-03 | Paper |
scientific article; zbMATH DE number 2044525 (Why is no real title available?) | 2004-02-18 | Paper |
scientific article; zbMATH DE number 2043308 (Why is no real title available?) | 2004-02-16 | Paper |
A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication The Computer Journal | 2003-08-07 | Paper |
1-out-of-n Signatures from a Variety of Keys Lecture Notes in Computer Science | 2003-07-16 | Paper |
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1941238 (Why is no real title available?) | 2003-06-29 | Paper |
scientific article; zbMATH DE number 1759330 (Why is no real title available?) | 2002-10-13 | Paper |
scientific article; zbMATH DE number 1759784 (Why is no real title available?) | 2002-10-07 | Paper |
scientific article; zbMATH DE number 1424190 (Why is no real title available?) | 2002-04-08 | Paper |
scientific article; zbMATH DE number 1722675 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1583778 (Why is no real title available?) | 2001-12-18 | Paper |
scientific article; zbMATH DE number 1618058 (Why is no real title available?) | 2001-07-12 | Paper |
scientific article; zbMATH DE number 1612509 (Why is no real title available?) | 2001-07-01 | Paper |
scientific article; zbMATH DE number 1504563 (Why is no real title available?) | 2000-09-12 | Paper |
scientific article; zbMATH DE number 1504554 (Why is no real title available?) | 2000-09-12 | Paper |
scientific article; zbMATH DE number 1418292 (Why is no real title available?) | 2000-07-26 | Paper |
scientific article; zbMATH DE number 1303140 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1024495 (Why is no real title available?) | 1997-07-20 | Paper |