| Publication | Date of Publication | Type |
|---|
| Faster cryptographic hash function from supersingular isogeny graphs | 2024-10-16 | Paper |
DAGS: reloaded revisiting dyadic key encapsulation Code-Based Cryptography | 2024-02-23 | Paper |
Schnorr-Based Implicit Certification: Improving the Security and Efficiency of Vehicular Communications IEEE Transactions on Computers | 2022-03-23 | Paper |
| Isogeny-based key compression without pairings | 2021-12-21 | Paper |
| The lattice-based digital signature scheme qTESLA | 2021-02-23 | Paper |
Designing efficient dyadic operations for cryptographic applications Journal of Mathematical Cryptology | 2020-06-24 | Paper |
Faster Key Compression for Isogeny-Based Cryptosystems IEEE Transactions on Computers | 2019-08-13 | Paper |
DAGS: key encapsulation using dyadic GS codes Journal of Mathematical Cryptology | 2019-01-11 | Paper |
| Faster isogeny-based compressed key agreement | 2018-06-22 | Paper |
| CAKE: CODE-based algorithm for key encapsulation | 2018-04-20 | Paper |
Decoding Square-Free Goppa Codes Over $\BBF_{p}$ IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Revisiting the Security of the ALRED Design and Two of Its Variants: Marvin and LetterSoup IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Lyra2: Efficient Password Hashing with High Security against Time-Memory Trade-Offs IEEE Transactions on Computers | 2017-05-16 | Paper |
The realm of the pairings Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Subgroup security in pairing-based cryptography Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Security issues in Sarkar's e-cash protocol Information Processing Letters | 2015-07-15 | Paper |
A panorama of post-quantum cryptography Open Problems in Mathematics and Computational Science | 2015-06-22 | Paper |
Quantum-assisted QD-CFS signatures Journal of Computer and System Sciences | 2014-11-24 | Paper |
Monoidic codes in cryptography Post-Quantum Cryptography | 2011-11-25 | Paper |
Quasi-dyadic CFS signatures Information Security and Cryptology | 2011-07-29 | Paper |
Signcryption schemes based on the Diffie-Hellman problem Practical Signcryption | 2011-05-18 | Paper |
Signcryption schemes based on bilinear maps Practical Signcryption | 2011-05-18 | Paper |
A survey on key management mechanisms for distributed wireless sensor networks Computer Networks | 2010-11-25 | Paper |
Whirlwind: a new cryptographic hash function Designs, Codes and Cryptography | 2010-09-16 | Paper |
Rotation symmetry in algebraically generated cryptographic substitution tables Information Processing Letters | 2010-04-19 | Paper |
Compact McEliece keys from Goppa codes Selected Areas in Cryptography | 2009-12-09 | Paper |
Efficient Hardware for the Tate Pairing Calculation in Characteristic Three Cryptographic Hardware and Embedded Systems – CHES 2005 | 2008-08-29 | Paper |
On Compressible Pairings and Their Computation Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Lecture Notes in Computer Science | 2008-03-18 | Paper |
Pairing-Friendly Elliptic Curves of Prime Order Selected Areas in Cryptography | 2007-11-15 | Paper |
Efficient computation of roots in finite fields Designs, Codes and Cryptography | 2006-05-29 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |