| Publication | Date of Publication | Type |
|---|
On the squares of LCD cyclic codes and their complements: study of several families and analyzing their parameters IEEE Transactions on Information Theory | 2025-01-23 | Paper |
| Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions | 2024-11-12 | Paper |
| Registered functional encryptions from pairings | 2024-11-12 | Paper |
Improved unbounded inner-product functional encryption Theoretical Computer Science | 2024-10-07 | Paper |
| Registered ABE via predicate encodings | 2024-09-13 | Paper |
Fine-grained polynomial functional encryption Theoretical Computer Science | 2024-08-27 | Paper |
Parameters of squares of primitive narrow-sense BCH codes and their complements IEEE Transactions on Information Theory | 2024-07-18 | Paper |
On Bose distance of a class of BCH codes with two types of designed distances Designs, Codes and Cryptography | 2024-06-28 | Paper |
Parameters of several families of binary duadic codes and their related codes Designs, Codes and Cryptography | 2024-01-15 | Paper |
| Updatable all-but-one dual projective hashing and its applications | 2022-06-08 | Paper |
On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes IEEE Transactions on Information Theory | 2022-02-17 | Paper |
CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN Theoretical Computer Science | 2021-09-06 | Paper |
Simple and efficient FE for quadratic functions Designs, Codes and Cryptography | 2021-08-02 | Paper |
| Simpler CCA secure PKE from LPN problem without double-trapdoor | 2021-01-18 | Paper |
| CCA secure multi-recipient KEM from LPN | 2021-01-18 | Paper |
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting Theoretical Computer Science | 2020-08-17 | Paper |
| An encrypted database with enforced access control and blockchain validation | 2019-10-31 | Paper |
Public key encryption with equality test via hash proof system Theoretical Computer Science | 2019-10-18 | Paper |
Efficient public key encryption with equality test in the standard model Theoretical Computer Science | 2019-02-14 | Paper |
Broadbeam for Massive MIMO Systems IEEE Transactions on Signal Processing | 2019-02-07 | Paper |
| More efficient CCA-secure identity-based dual receiver encryption | 2017-07-14 | Paper |
An effective localization attack in location-based social network Journal of East China Normal University. Natural Science Edition | 2016-10-06 | Paper |
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations Information Security and Privacy | 2016-08-31 | Paper |
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption Information Sciences | 2016-07-11 | Paper |
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model Mathematical and Computer Modelling | 2015-02-19 | Paper |
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model Information and Communications Security | 2014-09-29 | Paper |
Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree Journal of Mathematical Analysis and Applications | 2014-01-28 | Paper |
Constructing practical signcryption KEM from standard assumptions without random oracles Applied Cryptography and Network Security | 2014-01-24 | Paper |
| Tightly secure non-interactive multisignatures in the plain public key model | 2013-06-11 | Paper |
Non-interactive multisignatures in the plain public-key model with efficient verification Information Processing Letters | 2013-04-04 | Paper |
Pitfalls in identity based encryption using an elliptic curve combined public key Applied Mathematics Letters | 2012-08-30 | Paper |
Fully-Secure and Practical Sanitizable Signatures Information Security and Cryptology | 2011-07-29 | Paper |
| Security analysis and improvement of digital multi-signature on the generalized conic curve | 2011-07-19 | Paper |
Cryptanalysis and improvement of a block cipher based on multiple chaotic systems Mathematical Problems in Engineering | 2010-09-30 | Paper |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System Security and Privacy in Mobile Information and Communication Systems | 2010-04-24 | Paper |
| Adaptively secure threshold signature scheme in the standard model | 2010-01-21 | Paper |
Stochastic Preconditioning for Diagonally Dominant Matrices SIAM Journal on Scientific Computing | 2009-05-28 | Paper |
Efficient public key encryption with smallest ciphertext expansion from factoring Designs, Codes and Cryptography | 2009-03-31 | Paper |
A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations Computer Mathematics | 2009-01-29 | Paper |
A Practical Optimal Padding for Signature Schemes Lecture Notes in Computer Science | 2008-04-17 | Paper |
Hybrid proxy multisignature: a new type multi-party signature Information Sciences | 2008-01-03 | Paper |
Simulatability and security of certificateless threshold signatures Information Sciences | 2007-02-20 | Paper |
A new threshold proxy signature scheme from bilinear pairings Science in China. Series F | 2007-02-20 | Paper |
The braid-based bit commitment protocol Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Security of Pon-Lu-Jeng's Meta-He digital signature schemes Applied Mathematics and Computation | 2005-11-14 | Paper |
| scientific article; zbMATH DE number 2202168 (Why is no real title available?) | 2005-09-05 | Paper |
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms Applied Mathematics and Computation | 2005-08-05 | Paper |
| scientific article; zbMATH DE number 842025 (Why is no real title available?) | 1996-07-14 | Paper |