| Publication | Date of Publication | Type |
|---|
| TVES: threshold verifiably encrypted signature and its applications | 2024-07-17 | Paper |
| Deniable cryptosystems: simpler constructions and achieving leakage resilience | 2024-06-05 | Paper |
Fast hashing to \(\mathbb{G}_2\) on pairing-friendly curves with the lack of twists Finite Fields and their Applications | 2023-08-31 | Paper |
Quantum circuits for hyperelliptic curve discrete logarithms over the mersenne prime fields Quantum Information Processing | 2023-08-11 | Paper |
Forward-secure revocable secret handshakes from lattices Post-Quantum Cryptography | 2023-07-07 | Paper |
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy Lecture Notes in Computer Science | 2023-05-26 | Paper |
Secret handshakes: full dynamicity, deniability and lattice-based design Theoretical Computer Science | 2023-04-20 | Paper |
| Inner-product functional encryption from random linear codes: trial and challenges | 2023-04-13 | Paper |
| Forward-Secure Group Encryptions from Lattices | 2023-04-13 | Paper |
Quantum algorithm for solving hyperelliptic curve discrete logarithm problem Quantum Information Processing | 2023-01-05 | Paper |
CSH: A Post-quantum Secret Handshake Scheme from Coding Theory 1511.94164 | 2022-12-22 | Paper |
New Practical Public-Key Deniable Encryption 1515.94059 | 2022-12-21 | Paper |
Twisted Ate pairing on hyperelliptic curves and applications Science China Information Sciences | 2022-10-28 | Paper |
Memory leakage-resilient secret sharing schemes Science China Information Sciences | 2022-10-28 | Paper |
Improving ECDLP computation in characteristic 2 Information Security and Cryptology | 2022-10-14 | Paper |
Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography Information Processing Letters | 2022-09-02 | Paper |
Symmetric-key based proofs of retrievability supporting public verification Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
| Identity based linkable ring signature with logarithmic size | 2022-07-01 | Paper |
| Lattice-based secret handshakes with reusable credentials | 2022-06-08 | Paper |
Guruswami-Sudan Decoding of Elliptic Codes Through Module Basis Reduction IEEE Transactions on Information Theory | 2022-02-17 | Paper |
| An efficient blind signature scheme based on SM2 signature algorithm | 2021-12-08 | Paper |
Functional encryption for cubic polynomials and implementation Theoretical Computer Science | 2021-09-06 | Paper |
| Research development on efficient elliptic curve isogenous computations | 2021-07-01 | Paper |
| Optimized arithmetic operations for isogeny-based cryptography on Huff curves | 2021-06-08 | Paper |
ECC\(^2\): error correcting code and elliptic curve based cryptosystem Information Sciences | 2021-04-19 | Paper |
| Anonymous post-quantum cryptocash | 2021-03-17 | Paper |
Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE IEEE Transactions on Computers | 2020-12-14 | Paper |
Privacy preserving multi-party computation delegation for deep learning in cloud computing Information Sciences | 2020-09-09 | Paper |
Deniable searchable symmetric encryption Information Sciences | 2020-02-07 | Paper |
| Solving ECDLP via list decoding | 2020-01-10 | Paper |
Secure linear system computation in the presence of malicious adversaries Science China Information Sciences | 2019-11-18 | Paper |
Efficient obfuscation for CNF circuits and applications in cloud computing Soft Computing | 2019-07-02 | Paper |
| Bit security of the hyperelliptic curves Diffie-Hellman problem | 2018-11-07 | Paper |
| Implementing indistinguishability obfuscation using GGH15 | 2018-04-20 | Paper |
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm Advances in Mathematics of Communications | 2017-10-12 | Paper |
Faster Computation of Self-Pairings IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Efficient computation outsourcing for inverting a class of homomorphic functions Information Sciences | 2017-02-07 | Paper |
Identity-based chameleon hashing and signatures without key exposure Information Sciences | 2016-01-14 | Paper |
Solutions to the anti-piracy problem in oblivious transfer Journal of Computer and System Sciences | 2015-12-30 | Paper |
Security model and analysis of FHMQV, revisited Information Security and Cryptology | 2015-12-02 | Paper |
A new signature scheme without random oracles from bilinear pairings Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
| scientific article; zbMATH DE number 6262935 (Why is no real title available?) | 2014-02-28 | Paper |
Discrete logarithm based chameleon hashing and signatures without key exposure Computers and Electrical Engineering | 2013-05-31 | Paper |
Speeding up elliptic curve discrete logarithm computations with point halving Designs, Codes and Cryptography | 2013-04-03 | Paper |
| Times limited accountable anonymous online submission control system from single-verifier \(k\)-times group signature | 2013-04-03 | Paper |
On the resistance of Boolean functions against fast algebraic attacks Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Secret handshakes from ID-based message recovery signatures: a new generic approach Computers and Electrical Engineering | 2012-10-19 | Paper |
Generic security-amplifying methods of ordinary digital signatures Information Sciences | 2012-10-17 | Paper |
Computing elliptic curve discrete logarithms with the negation map Information Sciences | 2012-10-10 | Paper |
Improved Pollard rho method for computing discrete logarithms over finite extension fields Journal of Computational and Applied Mathematics | 2012-08-03 | Paper |
Efficient precomputation schemes of \(kP+lQ\) Information Processing Letters | 2012-07-25 | Paper |
An efficient collision detection method for computing discrete logarithms with Pollard's rho Journal of Applied Mathematics | 2012-04-04 | Paper |
Oblivious transfer with complex attribute-based access control Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Identity-based trapdoor mercurial commitments and applications Theoretical Computer Science | 2011-10-10 | Paper |
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures Provable Security | 2011-09-16 | Paper |
Comments and improvements on key-exposure free chameleon hashing based on factoring Information Security and Cryptology | 2011-07-29 | Paper |
Finding more Boolean functions with maximum algebraic immunity based on univariate polynomial representation Information Security and Privacy | 2011-07-07 | Paper |
New receipt-free voting scheme using double-trapdoor commitment Information Sciences | 2011-06-17 | Paper |
On relationship of computational Diffie-Hellman problem and computational square-root exponent problem Lecture Notes in Computer Science | 2011-06-08 | Paper |
Traitor tracing against public collaboration Information Security Practice and Experience | 2011-05-19 | Paper |
Computing bilinear pairings on elliptic curves with automorphisms Designs, Codes and Cryptography | 2011-03-10 | Paper |
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 Information Processing Letters | 2010-08-20 | Paper |
Attack on an ID-based authenticated group key agreement scheme from PKC 2004 Information Processing Letters | 2009-07-21 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure Applied Cryptography and Network Security | 2009-03-10 | Paper |
Efficient Partially Blind Signatures with Provable Security Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Efficient generic on-line/off-line (threshold) signatures without key exposure Information Sciences | 2008-11-20 | Paper |
Efficient Tate pairing computation using double-base chains Science in China. Series F | 2008-11-10 | Paper |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings Financial Cryptography and Data Security | 2008-09-09 | Paper |
Generic Security-Amplifying Methods of Ordinary Digital Signatures Applied Cryptography and Network Security | 2008-06-13 | Paper |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature Provable Security | 2008-06-10 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03 Applied Mathematics and Computation | 2005-11-22 | Paper |
| scientific article; zbMATH DE number 2222187 (Why is no real title available?) | 2005-11-02 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making Lecture Notes in Computer Science | 2005-08-17 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
New identity-based society oriented signature schemes from pairings on elliptic curves Applied Mathematics and Computation | 2005-02-23 | Paper |
Cryptanalysis of Lee-Hwang-Li's key authentication scheme Applied Mathematics and Computation | 2005-02-22 | Paper |
| scientific article; zbMATH DE number 2080678 (Why is no real title available?) | 2004-08-04 | Paper |
Selection of secure hyperelliptic curves of \textit{g=2} based on a subfield Journal of Computer Science and Technology | 2004-07-01 | Paper |
| scientific article; zbMATH DE number 2043331 (Why is no real title available?) | 2004-02-16 | Paper |
Secure Web transaction with anonymous mobile agent over Internet Journal of Computer Science and Technology | 2003-08-13 | Paper |
| scientific article; zbMATH DE number 1950344 (Why is no real title available?) | 2003-07-17 | Paper |
ID-Based Blind Signature and Ring Signature from Pairings Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1942823 (Why is no real title available?) | 2002-01-01 | Paper |