| Publication | Date of Publication | Type |
|---|
Learning strongly deterministic even linear languages from positive examples Lecture Notes in Computer Science | 2023-12-08 | Paper |
Perfectly secure message transmission against rational timid adversaries Lecture Notes in Computer Science | 2023-08-02 | Paper |
Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation Information Security Practice and Experience | 2023-06-30 | Paper |
Arbitrable blind quantum computation Quantum Information Processing | 2023-01-05 | Paper |
Quantum verifiable protocol for secure modulo zero-sum randomness Quantum Information Processing | 2022-12-06 | Paper |
Guesswork of a Quantum Ensemble IEEE Transactions on Information Theory | 2022-07-13 | Paper |
| A guests managing system with lattice-based verifier-local revocation group signature scheme with time-bound keys | 2021-08-31 | Paper |
| Achieving full security for lattice-based group signatures with verifier-local revocation | 2021-01-18 | Paper |
Perfectly secure message transmission against independent rational adversaries Lecture Notes in Computer Science | 2020-07-20 | Paper |
| New assumptions on isogenous pairing groups with applications to attribute-based encryption | 2019-03-29 | Paper |
Private conjunctive query over encrypted data Progress in Cryptology - AFRICACRYPT 2017 | 2017-08-04 | Paper |
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors Journal of Mathematical Cryptology | 2017-03-16 | Paper |
Secure statistical analysis using RLWE-based homomorphic encryption Information Security and Privacy | 2015-10-20 | Paper |
Practical packing method in somewhat homomorphic encryption Data Privacy Management and Autonomous Spontaneous Security | 2015-10-01 | Paper |
Packed homomorphic encryption based on ideal lattices and its application to biometrics Security Engineering and Intelligence Informatics | 2014-09-30 | Paper |
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption Journal of Mathematical Cryptology | 2014-09-17 | Paper |
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption Information Security and Privacy | 2014-07-24 | Paper |
Computational indistinguishability between quantum states and its cryptographic application Journal of Cryptology | 2012-07-10 | Paper |
Public Discussion Must Be Back and Forth in Secure Message Transmission Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Statistically-hiding quantum bit commitment from approximable-preimage-size quantum one-way function Theory of Quantum Computation, Communication, and Cryptography | 2010-03-09 | Paper |
Reducing Complexity Assumptions for Oblivious Transfer Advances in Information and Computer Security | 2009-10-28 | Paper |
Strengthening the Security of Distributed Oblivious Transfer Information Security and Privacy | 2009-06-25 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification Lecture Notes in Computer Science | 2009-01-09 | Paper |
Computational Indistinguishability Between Quantum States and Its Cryptographic Application Lecture Notes in Computer Science | 2008-05-06 | Paper |
Low-density attack revisited Designs, Codes and Cryptography | 2007-09-20 | Paper |
| Quantum computational cryptography | 2007-05-09 | Paper |
Universal test for quantum one-way permutations Theoretical Computer Science | 2005-12-06 | Paper |
Mathematical Foundations of Computer Science 2004 Lecture Notes in Computer Science | 2005-08-22 | Paper |
| scientific article; zbMATH DE number 2089128 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2085420 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2080997 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2048531 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2043317 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1618042 (Why is no real title available?) | 2002-07-28 | Paper |
Strong encryption of public key cryptosystems based on weak randomness hypotheses RIMS Kokyuroku | 2001-09-17 | Paper |
Inferring pure context-free languages from positive data Acta Cybernetica | 2001-06-13 | Paper |
| scientific article; zbMATH DE number 1511691 (Why is no real title available?) | 2000-09-27 | Paper |
Learning deterministic even linear languages from positive examples Theoretical Computer Science | 1998-07-22 | Paper |
| scientific article; zbMATH DE number 1107671 (Why is no real title available?) | 1998-06-11 | Paper |
| scientific article; zbMATH DE number 1059896 (Why is no real title available?) | 1998-02-04 | Paper |