| Publication | Date of Publication | Type |
|---|
| Efficient succinct zero-knowledge arguments in the CL framework | 2025-01-17 | Paper |
| An improved threshold homomorphic cryptosystem based on class groups | 2025-01-10 | Paper |
| Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\) | 2023-08-16 | Paper |
| I want to ride my \texttt{BICYCL} : \texttt{BICYCL} implements cryptography in class groups | 2023-07-05 | Paper |
| Blind Functional Encryption | 2022-12-21 | Paper |
| Bandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive security | 2022-11-17 | Paper |
| A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency | 2022-04-19 | Paper |
| Bandwidth-efficient threshold EC-DSA | 2021-12-01 | Paper |
| Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions | 2021-02-01 | Paper |
| Two-party ECDSA from hash proof systems and efficient instantiations | 2020-03-09 | Paper |
| Practical fully secure unrestricted inner product functional encryption modulo \(p\) | 2019-01-23 | Paper |
| Verifiable message-locked encryption | 2018-10-26 | Paper |
| Encryption switching protocols revisited: switching modulo \(p\) | 2017-11-03 | Paper |
| A New Efficient Threshold Ring Signature Scheme Based on Coding Theory | 2017-07-12 | Paper |
| Implementing Candidate Graded Encoding Schemes from Ideal Lattices | 2016-03-23 | Paper |
| Linearly Homomorphic Encryption from $$\mathsf {DDH}$$ | 2016-03-02 | Paper |
| Proxy Re-Encryption Scheme Supporting a Selection of Delegatees | 2014-06-24 | Paper |
| Lattice-Based Group Signatures with Logarithmic Signature Size | 2013-12-10 | Paper |
| Relations between semantic security and anonymity in identity-based encryption | 2013-03-28 | Paper |
| Homomorphic Encryption for Multiplications and Pairing Evaluation | 2012-09-25 | Paper |
| Short Attribute-Based Signatures for Threshold Predicates | 2012-06-08 | Paper |
| Plaintext-Checkable Encryption | 2012-06-08 | Paper |
| Attribute-based encryption schemes with constant-size ciphertexts | 2012-05-14 | Paper |
| A Variant of Miller’s Formula and Algorithm | 2010-11-26 | Paper |
| Time-selective convertible undeniable signatures with short conversion receipts | 2010-07-20 | Paper |
| Constant Size Ciphertexts in Threshold Attribute-Based Encryption | 2010-05-28 | Paper |
| Multi-designated verifiers signatures: anonymity without encryption | 2010-01-29 | Paper |
| Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses | 2009-12-15 | Paper |
| On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis | 2009-05-12 | Paper |
| Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions | 2008-11-27 | Paper |
| On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures | 2008-06-24 | Paper |
| Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption | 2008-06-17 | Paper |
| Trapdoor Sanitizable Signatures and Their Application to Content Protection | 2008-06-13 | Paper |
| Universally Convertible Directed Signatures | 2008-03-18 | Paper |
| Short Undeniable Signatures Without Random Oracles: The Missing Link | 2008-03-17 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Universal forgery on Sekhar's signature scheme with message recovery | 2005-02-28 | Paper |