| Publication | Date of Publication | Type |
|---|
| A refined hardness estimation of LWE in two-step mode | 2024-11-12 | Paper |
| Lattice-based threshold, accountable, and private signature | 2024-11-12 | Paper |
| Hardness of (M)LWE with semi-uniform seeds | 2024-03-28 | Paper |
| Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class | 2024-03-27 | Paper |
| Group public key encryption supporting equality test without bilinear pairings | 2024-03-07 | Paper |
| MDOPE: efficient multi-dimensional data order preserving encryption scheme | 2024-02-28 | Paper |
| Toward practical privacy-preserving linear regression | 2024-02-28 | Paper |
| A polynomial system for bit-based division property solving by quantum algorithm | 2024-01-25 | Paper |
| Hiding the input-size in multi-party private set intersection | 2023-09-07 | Paper |
| Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting | 2023-06-13 | Paper |
| Improved key-recovery attacks on reduced-round WEM-8 | 2022-09-22 | Paper |
| Lattice-based linearly homomorphic signature scheme over binary field | 2021-12-15 | Paper |
| Accountable identity-based encryption with distributed private key generators | 2021-03-16 | Paper |
| A key-sharing based secure deduplication scheme in cloud storage | 2021-02-05 | Paper |
| D-NTRU: more efficient and average-case IND-CPA secure NTRU variant | 2020-09-08 | Paper |
| Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts | 2020-01-29 | Paper |
| Algebraic Attacks Against Several Weak Variants of GVW’13 ABE | 2019-12-10 | Paper |
| Signature scheme using the root extraction problem on quaternions | 2019-11-19 | Paper |
| Improved secure fuzzy auditing protocol for cloud data storage | 2019-08-12 | Paper |
| Preimage selective trapdoor function: how to repair an easy problem | 2019-02-08 | Paper |
| Lattice-based certificateless encryption scheme | 2018-12-19 | Paper |
| Sieve method for polynomial linear equivalence | 2018-10-10 | Paper |
| Identity-based blind signature from lattices | 2018-05-25 | Paper |
| An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking | 2018-05-03 | Paper |
| Identity-Based Blind Signature from Lattices in Standard Model | 2017-05-05 | Paper |
| The termination of the F5 algorithm revisited | 2017-02-10 | Paper |
| Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model | 2015-11-20 | Paper |
| Authenticated asymmetric group key agreement based on certificateless cryptosystem | 2014-08-14 | Paper |
| Identity-based key distribution for mobile ad hoc networks | 2013-07-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4926909 | 2013-06-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4926802 | 2013-06-20 | Paper |
| Group key agreement for secure group communication in dynamic peer systems | 2012-10-23 | Paper |
| The Termination of Algorithms for Computing Gr\"{o}bner Bases | 2012-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3110729 | 2012-01-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3098534 | 2011-11-17 | Paper |
| Quadratic compact knapsack public-key cryptosystem | 2010-06-28 | Paper |
| NTRUSign With a New Perturbation | 2009-02-24 | Paper |
| A knapsack-based probabilistic encryption scheme | 2007-10-10 | Paper |
| New weak keys in RSA | 2007-06-01 | Paper |