| Publication | Date of Publication | Type |
|---|
Forgery attacks on two provably secure certificateless signature schemes Information Sciences | 2021-04-19 | Paper |
| Security analysis of improved cubic UOV signature schemes | 2018-06-15 | Paper |
| An existential unforgeable signature scheme based on multivariate quadratic equations | 2018-04-06 | Paper |
Cryptanalysis of RGB, a mixed multivariate signature scheme Finite Fields and their Applications | 2017-05-24 | Paper |
Security models for certificateless signature schemes revisited Information Sciences | 2017-05-16 | Paper |
An efficient ring signature scheme from pairings Information Sciences | 2017-05-16 | Paper |
On delegatability of designated verifier signature schemes Information Sciences | 2017-02-07 | Paper |
Lite-Rainbow: lightweight signature schemes based on multivariate quadratic equations and their secure implementations Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
A strong designated verifier signature scheme tightly related to the LRSW assumption International Journal of Computer Mathematics | 2013-12-23 | Paper |
Security analysis of three password authentication schemes Journal of Universal Computer Science | 2012-09-27 | Paper |
Security pitfalls of the certificateless signature and multi-receiver signcryption schemes Fundamenta Informaticae | 2012-06-19 | Paper |
A round-optimal three-party ID-based authenticated key agreement protocol Information Sciences | 2012-06-08 | Paper |
Short designated verifier proxy signatures Computers and Electrical Engineering | 2011-07-28 | Paper |
Rogue-key attacks on the multi-designated verifiers signature scheme Information Processing Letters | 2010-04-19 | Paper |
Breaking the short certificateless signature scheme Information Sciences | 2009-03-24 | Paper |
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper) Information and Communications Security | 2008-11-11 | Paper |
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols Information Sciences | 2007-02-16 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Security flaws in authentication and key establishment protocols for mobile communications Applied Mathematics and Computation | 2005-11-16 | Paper |
Off-line password-guessing attacks on the generalized key agreement and password authentication protocol Applied Mathematics and Computation | 2005-11-16 | Paper |
Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings Applied Mathematics and Computation | 2005-08-05 | Paper |
| scientific article; zbMATH DE number 1980954 (Why is no real title available?) | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1950602 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1808284 (Why is no real title available?) | 2002-09-26 | Paper |
\(p\)-adic heights Communications of the Korean Mathematical Society | 2001-03-19 | Paper |
| scientific article; zbMATH DE number 1558385 (Why is no real title available?) | 2001-01-29 | Paper |