| Publication | Date of Publication | Type |
|---|
| Signature for objects: formalizing how to authenticate physical data and more | 2024-07-17 | Paper |
| Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions | 2024-03-14 | Paper |
On Private Information Retrieval Supporting Range Queries 1511.68044 | 2022-12-22 | Paper |
| Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA | 2022-11-09 | Paper |
| Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials | 2022-07-06 | Paper |
| Evolving homomorphic secret sharing for hierarchical access structures | 2022-04-22 | Paper |
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity Science China Information Sciences | 2021-12-15 | Paper |
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption Lecture Notes in Computer Science | 2016-03-02 | Paper |
More constructions of re-splittable threshold public key encryption Advances in Information and Computer Security | 2015-05-27 | Paper |
Reducing the spread of damage of key exposures in key-insulated encryption Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Construction of highly nonlinear resilient S-boxes with given degree Designs, Codes and Cryptography | 2012-07-31 | Paper |
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Enumeration of balanced symmetric functions over \(GF(p)\) Information Processing Letters | 2012-03-19 | Paper |
Balanced \(2p\)-variable rotation symmetric Boolean functions with maximum algebraic immunity Applied Mathematics Letters | 2011-12-28 | Paper |
On black-box separations among injective one-way functions Theory of Cryptography | 2011-05-19 | Paper |
Parallel decryption queries in bounded chosen ciphertext attacks Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
On-line non-transferable signatures revisited Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Efficient generic constructions of timed-release encryption with pre-open capability Lecture Notes in Computer Science | 2010-11-26 | Paper |
Efficient constructions of signcryption schemes and signcryption composability Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Unconditionally secure chaffing-and-winnowing for multiple use Lecture Notes in Computer Science | 2009-12-03 | Paper |
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity Cryptology and Network Security | 2009-11-26 | Paper |
A Generic Construction of Timed-Release Encryption with Pre-open Capability Advances in Information and Computer Security | 2009-10-28 | Paper |
Generic Construction of Stateful Identity Based Encryption Lecture Notes in Computer Science | 2009-09-29 | Paper |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Relations Among Notions of Security for Identity Based Encryption Schemes LATIN 2006: Theoretical Informatics | 2008-09-18 | Paper |
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function Provable Security | 2008-06-10 | Paper |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Proxy Signatures Secure Against Proxy Key Exposure Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT Information Security and Privacy | 2007-09-07 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
| scientific article; zbMATH DE number 2080680 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 1424192 (Why is no real title available?) | 2002-04-08 | Paper |