| Publication | Date of Publication | Type |
|---|
| Randomness recoverable secret sharing schemes | 2024-11-22 | Paper |
Randomness recoverable secret sharing schemes Journal of Cryptology | 2024-10-11 | Paper |
Partial secret sharing schemes IEEE Transactions on Information Theory | 2024-07-18 | Paper |
On ideal and weakly-ideal access structures Advances in Mathematics of Communications | 2023-07-07 | Paper |
On abelian and homomorphic secret sharing schemes Journal of Cryptology | 2021-11-24 | Paper |
On group-characterizability of homomorphic secret sharing schemes Theoretical Computer Science | 2021-10-21 | Paper |
On ideal homomorphic secret sharing schemes and their decomposition Designs, Codes and Cryptography | 2021-09-06 | Paper |
Optimal linear secret sharing schemes for graph access structures on six participants Theoretical Computer Science | 2019-05-17 | Paper |
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components Designs, Codes and Cryptography | 2019-01-11 | Paper |
Reduced access structures with four minimal qualified subsets on six participants Advances in Mathematics of Communications | 2018-09-21 | Paper |
Ciphertext-only attack on \(d\times d\) Hill in \(O(d 13^d)\) Information Processing Letters | 2016-11-23 | Paper |
A mix-net from any CCA2 secure cryptosystem Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Randomized partial checking revisited Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Improved Linear Differential Attacks on CubeHash Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Linearization framework for collision attacks: application to CubeHash and MD6 Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
On Reconstruction of RC4 Keys from Internal States Mathematical Methods in Computer Science | 2009-01-22 | Paper |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Security of Jump Controlled Sequence Generators for Stream Ciphers Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Fast Software Encryption | 2008-09-18 | Paper |
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Reduced Complexity Attacks on the Alternating Step Generator Selected Areas in Cryptography | 2008-03-25 | Paper |