| Publication | Date of Publication | Type |
|---|
| Efficient secure storage with version control and key rotation | 2024-09-13 | Paper |
| Predicate aggregate signatures and applications | 2024-06-26 | Paper |
| Retraction Note: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment | 2024-05-02 | Paper |
| Privacy-preserving decentralised singular value decomposition | 2024-04-19 | Paper |
| Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting) | 2023-11-16 | Paper |
| Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) | 2023-05-12 | Paper |
| Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy | 2023-04-13 | Paper |
| CCA updatable encryption against malicious re-encryption attacks | 2023-03-29 | Paper |
| Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment | 2022-12-01 | Paper |
| Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service | 2022-10-14 | Paper |
| Making \textit{any} attribute-based encryption accountable, efficiently | 2022-08-25 | Paper |
| Making Any Identity-Based Encryption Accountable, Efficiently | 2022-08-19 | Paper |
| Witness authenticating NIZKs and applications | 2022-05-18 | Paper |
| Multi-input laconic function evaluation | 2021-06-08 | Paper |
| Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited | 2021-03-15 | Paper |
| A survey on true random number generators based on chaos | 2020-02-18 | Paper |
| Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog | 2020-01-28 | Paper |
| Graded signatures | 2018-10-18 | Paper |
| Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes | 2018-10-18 | Paper |
| Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications | 2018-10-18 | Paper |
| Correcting subverted random oracles | 2018-09-26 | Paper |
| Making public key functional encryption function private, distributively | 2018-05-29 | Paper |
| Updatable functional encryption | 2017-10-23 | Paper |
| A Homotopy Method for Locating All the Poles of a Parallel Plate Waveguide With the PML | 2017-09-20 | Paper |
| Cliptography: Clipping the Power of Kleptographic Attacks | 2017-01-06 | Paper |
| Honey Encryption Beyond Message Recovery Security | 2016-09-09 | Paper |
| Communication Optimal Tardos-Based Asymmetric Fingerprinting | 2016-03-02 | Paper |
| Towards Forward Security Properties for PEKS and IBE | 2015-10-20 | Paper |
| On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes | 2015-09-17 | Paper |
| Efficient algorithms for secure outsourcing of bilinear pairings | 2014-12-02 | Paper |
| New Algorithms for Secure Outsourcing of Modular Exponentiations | 2013-10-23 | Paper |
| Extended KCI attack against two-party key establishment protocols | 2013-04-04 | Paper |
| Public key encryption schemes supporting equality test with authorisation of different granularity | 2012-11-16 | Paper |
| Towards a security model for computational puzzle schemes | 2011-11-29 | Paper |
| KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks | 2011-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3016718 | 2011-07-19 | Paper |
| Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization | 2011-07-07 | Paper |
| COMPARISON OF DIFFERENT DAILY STREAMFLOW SERIES IN US AND CHINA, UNDER A VIEWPOINT OF COMPLEX NETWORKS | 2010-09-23 | Paper |
| TF/TA<sup>2</sup> trajectory tracking using nonlinear predictive control approach | 2009-11-06 | Paper |
| Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security | 2009-09-29 | Paper |
| Inter-domain Identity-Based Proxy Re-encryption | 2009-04-29 | Paper |
| An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication | 2009-03-06 | Paper |
| Type-Based Proxy Re-encryption and Its Construction | 2009-01-22 | Paper |
| SCALING BEHAVIOR OF DIFFUSION LIMITED AGGREGATION IN PERCOLATION CLUSTER | 2008-11-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3518416 | 2008-08-07 | Paper |
| Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability | 2008-06-24 | Paper |
| Extended Private Information Retrieval and Its Application in Biometrics Authentications | 2008-04-15 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |