| Publication | Date of Publication | Type |
|---|
| Time-based attribute-based proxy re-encryption with decryption key update | 2024-12-11 | Paper |
| Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond | 2024-11-12 | Paper |
| Non-interactive zero-knowledge functional proofs | 2024-09-13 | Paper |
| Robust publicly verifiable covert security: limited information leakage and guaranteed correctness with low overhead | 2024-08-30 | Paper |
| Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery | 2024-05-13 | Paper |
| Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing | 2024-04-30 | Paper |
| Identifying buckling resistance of reinforced concrete columns during inelastic deformation | 2024-04-23 | Paper |
| Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance | 2024-02-28 | Paper |
| Asymmetric group message franking: definitions and constructions | 2023-12-08 | Paper |
| Predicate private set intersection with linear complexity | 2023-11-10 | Paper |
| Generalized attack on ECDSA: known bits in arbitrary positions | 2023-11-07 | Paper |
| Single-state distributed \(k\)-winners-take-all neural network model | 2023-09-08 | Paper |
| Optimizing rectangle attacks: a unified and generic framework for key recovery | 2023-08-25 | Paper |
| Anonymous public key encryption under corruptions | 2023-08-25 | Paper |
| EHNP strikes back: analyzing SM2 implementations | 2023-06-02 | Paper |
| Simulation-based bi-selective opening security for public key encryption | 2023-05-12 | Paper |
| Simulatable verifiable random function from the LWE assumption | 2023-04-27 | Paper |
| Two-pass authenticated key exchange with explicit authentication and tight security | 2023-03-21 | Paper |
| Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment | 2022-12-22 | Paper |
| New Proof for BKP IBE Scheme and Improvement in the MIMC Setting | 2022-12-09 | Paper |
| CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles | 2022-10-28 | Paper |
| On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction | 2022-09-23 | Paper |
| Attribute-based conditional proxy re-encryption in the standard model under LWE | 2022-06-24 | Paper |
| Efficient and fully secure lattice-based IBE with equality test | 2022-06-08 | Paper |
| Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting | 2022-04-22 | Paper |
| Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances | 2021-07-22 | Paper |
| Robustly reusable fuzzy extractor with imperfect randomness | 2021-05-10 | Paper |
| Scalable revocable identity-based signature over lattices in the standard model | 2021-04-14 | Paper |
| Key regeneration-free ciphertext-policy attribute-based encryption and its application | 2021-03-31 | Paper |
| Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations | 2021-03-18 | Paper |
| A hybrid universal blind quantum computation | 2020-12-10 | Paper |
| Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification | 2020-12-10 | Paper |
| New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks | 2020-09-29 | Paper |
| Notes on a provably-secure certificate-based encryption against malicious CA attacks | 2020-09-09 | Paper |
| New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model | 2020-07-20 | Paper |
| Collision resistant hashing from sub-exponential learning parity with noise | 2020-05-05 | Paper |
| Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields | 2020-01-28 | Paper |
| On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction | 2019-12-12 | Paper |
| Indistinguishability of pure orthogonal product states by LOCC | 2017-10-25 | Paper |
| Tightly Secure IBE Under Constant-Size Master Public Key | 2017-06-13 | Paper |
| Verifiable Computation over Large Database with Incremental Updates | 2017-05-16 | Paper |
| On the security of two identity-based conditional proxy re-encryption schemes | 2016-11-04 | Paper |
| Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security | 2016-09-02 | Paper |
| Towards semantically secure outsourcing of association rule mining on categorical data | 2016-07-08 | Paper |
| CCA-Secure Keyed-Fully Homomorphic Encryption | 2016-04-13 | Paper |
| Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract) | 2016-01-11 | Paper |
| (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond | 2015-12-10 | Paper |
| Security Model and Analysis of FHMQV, Revisited | 2015-12-02 | Paper |
| Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext | 2015-11-20 | Paper |
| Fine-Grained Conditional Proxy Re-Encryption and Application | 2015-09-29 | Paper |
| A note on the security of KHL scheme | 2015-09-25 | Paper |
| Verifiable Computation over Large Database with Incremental Updates | 2015-07-24 | Paper |
| Verifiable Computation on Outsourced Encrypted Data | 2015-07-24 | Paper |
| Authorized Keyword Search on Encrypted Data | 2015-07-24 | Paper |
| The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions | 2015-07-06 | Paper |
| Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model | 2015-02-19 | Paper |
| Pseudorandom generators from regular one-way functions: new constructions with improved parameters | 2015-01-28 | Paper |
| Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model | 2014-09-29 | Paper |
| Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack | 2014-05-27 | Paper |
| Adaptable Ciphertext-Policy Attribute-Based Encryption | 2014-02-18 | Paper |
| Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles | 2014-01-24 | Paper |
| Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters | 2013-12-10 | Paper |
| Cryptanalysis of an identity based broadcast encryption scheme without random oracles | 2013-03-28 | Paper |
| Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks | 2013-03-18 | Paper |
| Accountable Authority Identity-Based Encryption with Public Traceability | 2013-03-18 | Paper |
| Zero-knowledge argument for simultaneous discrete logarithms | 2012-11-21 | Paper |
| Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
| On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 | 2011-03-15 | Paper |
| Certificateless key-insulated signature without random oracles | 2011-02-02 | Paper |
| Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings | 2011-01-28 | Paper |
| Cryptanalysis of a certificateless signcryption scheme in the standard model | 2011-01-28 | Paper |
| Strong key-insulated signature in the standard model | 2011-01-05 | Paper |
| Optionally Identifiable Private Handshakes | 2010-11-23 | Paper |
| Generic Constructions of Parallel Key-Insulated Encryption | 2010-09-10 | Paper |
| Zero-Knowledge Argument for Simultaneous Discrete Logarithms | 2010-07-20 | Paper |
| Efficient Unidirectional Proxy Re-Encryption | 2010-05-04 | Paper |
| Efficient discrete logarithm based multi-signature scheme in the plain public key model | 2010-02-25 | Paper |
| Identity-Based Strong Key-Insulated Signature Without Random Oracles | 2010-02-12 | Paper |
| Self-enforcing Private Inference Control | 2009-12-11 | Paper |
| Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security | 2009-09-29 | Paper |
| Conditional Proxy Broadcast Re-Encryption | 2009-06-25 | Paper |
| Identity-Based Key-Insulated Signature with Secure Key-Updates | 2009-01-15 | Paper |
| Chosen-Ciphertext Secure Proxy Re-encryption without Pairings | 2009-01-09 | Paper |
| Identity-Based Threshold Key-Insulated Encryption without Random Oracles | 2008-04-24 | Paper |
| Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction | 2008-04-11 | Paper |
| Pirate decoder for the broadcast encryption schemes from Crypto 2005 | 2007-10-12 | Paper |