| Publication | Date of Publication | Type |
|---|
| Secret Sharing Schemes for (k, n)-Consecutive Access Structures | 2023-06-28 | Paper |
| How (not) to achieve both coercion resistance and cast as intended verifiability in remote evoting | 2022-06-29 | Paper |
| Shorter lattice-based zero-knowledge proofs for the correctness of a shuffle | 2022-06-01 | Paper |
| Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications | 2020-05-11 | Paper |
| On the Computational Security of a Distributed Key Distribution Scheme | 2018-06-12 | Paper |
| Efficient cryptosystems from \(2^k\)-th power residue symbols | 2017-05-22 | Paper |
| Attribute-based versions of Schnorr and ElGamal | 2016-02-16 | Paper |
| New results and applications for multi-secret sharing schemes | 2014-09-04 | Paper |
| Sharing many secrets with computational provable security | 2014-04-11 | Paper |
| Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications | 2014-03-25 | Paper |
| Signcryption schemes with threshold unsigncryption, and applications | 2014-03-17 | Paper |
| Attribute-based signatures from RSA | 2014-03-13 | Paper |
| Ad-hoc threshold broadcast encryption with shorter ciphertexts | 2013-12-06 | Paper |
| Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience | 2013-10-23 | Paper |
| Relations between semantic security and anonymity in identity-based encryption | 2013-03-28 | Paper |
| Short Attribute-Based Signatures for Threshold Predicates | 2012-06-08 | Paper |
| Attribute-based encryption schemes with constant-size ciphertexts | 2012-05-14 | Paper |
| Restricted adaptive oblivious transfer | 2011-12-07 | Paper |
| Any 2-asummable bipartite function is weighted threshold | 2011-08-10 | Paper |
| Revocable attribute-based signatures with adaptive security in the standard model | 2011-06-29 | Paper |
| On the generic construction of identity-based signatures with additional properties | 2011-06-03 | Paper |
| On server trust in private proxy auctions | 2010-11-30 | Paper |
| A new algorithm to search for small nonzero \(|x^3-y^2|\) values | 2010-11-07 | Paper |
| Some (in)sufficient conditions for secure hybrid encryption | 2010-10-22 | Paper |
| Fully secure threshold unsigncryption | 2010-10-12 | Paper |
| Additively homomorphic encryption with \(d\)-operand multiplications | 2010-08-24 | Paper |
| Extensions of access structures and their cryptographic applications | 2010-08-23 | Paper |
| Flaws in some self-healing key distribution schemes with revocation | 2010-08-16 | Paper |
| On the security of public key cryptosystems with a double decryption mechanism | 2010-06-09 | Paper |
| Constant size ciphertexts in threshold attribute-based encryption | 2010-05-28 | Paper |
| Verifiable secret sharing for general access structures, with application to fully distributed proxy signatures | 2010-03-31 | Paper |
| Distributed RSA Signature Schemes for General Access Structures | 2010-02-09 | Paper |
| Partial symbol ordering distance | 2009-12-17 | Paper |
| A Generic Construction for Token-Controlled Public Key Encryption | 2008-09-09 | Paper |
| Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption | 2008-06-17 | Paper |
| CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts | 2008-06-10 | Paper |
| On the Generic Construction of Identity-Based Signatures with Additional Properties | 2008-04-24 | Paper |
| Identity-based ring signatures from RSA | 2008-01-07 | Paper |
| Cryptographic techniques for mobile ad-hoc networks | 2007-11-30 | Paper |
| Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
| Distributed ring signatures from general dual access structures | 2006-11-22 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450778 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408455 | 2003-06-29 | Paper |