| Publication | Date of Publication | Type |
|---|
| On the squares of LCD cyclic codes and their complements: study of several families and analyzing their parameters | 2025-01-23 | Paper |
| Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions | 2024-11-12 | Paper |
| Registered functional encryptions from pairings | 2024-11-12 | Paper |
| Improved unbounded inner-product functional encryption | 2024-10-07 | Paper |
| Registered ABE via predicate encodings | 2024-09-13 | Paper |
| Fine-grained polynomial functional encryption | 2024-08-27 | Paper |
| Parameters of squares of primitive narrow-sense BCH codes and their complements | 2024-07-18 | Paper |
| On Bose distance of a class of BCH codes with two types of designed distances | 2024-06-28 | Paper |
| Parameters of several families of binary duadic codes and their related codes | 2024-01-15 | Paper |
| Updatable all-but-one dual projective hashing and its applications | 2022-06-08 | Paper |
| On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes | 2022-02-17 | Paper |
| CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN | 2021-09-06 | Paper |
| Simple and efficient FE for quadratic functions | 2021-08-02 | Paper |
| Simpler CCA secure PKE from LPN problem without double-trapdoor | 2021-01-18 | Paper |
| CCA secure multi-recipient KEM from LPN | 2021-01-18 | Paper |
| A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting | 2020-08-17 | Paper |
| An encrypted database with enforced access control and blockchain validation | 2019-10-31 | Paper |
| Public key encryption with equality test via hash proof system | 2019-10-18 | Paper |
| Efficient public key encryption with equality test in the standard model | 2019-02-14 | Paper |
| Broadbeam for Massive MIMO Systems | 2019-02-07 | Paper |
| More efficient CCA-secure identity-based dual receiver encryption | 2017-07-14 | Paper |
| An effective localization attack in location-based social network | 2016-10-06 | Paper |
| Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations | 2016-08-31 | Paper |
| Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption | 2016-07-11 | Paper |
| Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model | 2015-02-19 | Paper |
| Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model | 2014-09-29 | Paper |
| Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree | 2014-01-28 | Paper |
| Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles | 2014-01-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4925068 | 2013-06-11 | Paper |
| Non-interactive multisignatures in the plain public-key model with efficient verification | 2013-04-04 | Paper |
| Pitfalls in identity based encryption using an elliptic curve combined public key | 2012-08-30 | Paper |
| Fully-Secure and Practical Sanitizable Signatures | 2011-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3016682 | 2011-07-19 | Paper |
| Cryptanalysis and improvement of a block cipher based on multiple chaotic systems | 2010-09-30 | Paper |
| An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System | 2010-04-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5851072 | 2010-01-21 | Paper |
| Stochastic Preconditioning for Diagonally Dominant Matrices | 2009-05-28 | Paper |
| Efficient public key encryption with smallest ciphertext expansion from factoring | 2009-03-31 | Paper |
| A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations | 2009-01-29 | Paper |
| A Practical Optimal Padding for Signature Schemes | 2008-04-17 | Paper |
| Hybrid proxy multisignature: a new type multi-party signature | 2008-01-03 | Paper |
| Simulatability and security of certificateless threshold signatures | 2007-02-20 | Paper |
| A new threshold proxy signature scheme from bilinear pairings | 2007-02-20 | Paper |
| The braid-based bit commitment protocol | 2006-11-15 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Security of Pon-Lu-Jeng's Meta-He digital signature schemes | 2005-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5314391 | 2005-09-05 | Paper |
| Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms | 2005-08-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4862246 | 1996-07-14 | Paper |