| Publication | Date of Publication | Type |
|---|
| A lower bound on the share size of leakage-resilient secret-sharing schemes | 2024-10-02 | Paper |
| Lower bounds on the share size of leakage resilient cheating detectable secret sharing | 2024-06-05 | Paper |
PAKEs: new framework, new techniques and more efficient lattice-based constructions in the standard model Lecture Notes in Computer Science | 2022-10-13 | Paper |
A new framework for deniable secure key exchange Information and Computation | 2022-06-08 | Paper |
On Optimal Secure Message Transmission by Public Discussion IEEE Transactions on Information Theory | 2017-07-27 | Paper |
On message authentication with a correlated setup Information Processing Letters | 2016-01-05 | Paper |
On \(\tau\)-time secure key agreement Science China Information Sciences | 2015-08-05 | Paper |
Timed encryption with application to deniable key exchange Theoretical Computer Science | 2014-12-02 | Paper |
Persistent asymmetric password-based key exchange Journal of Mathematical Cryptology | 2014-02-05 | Paper |
An efficient conditionally anonymous ring signature in the random oracle model Theoretical Computer Science | 2012-11-27 | Paper |
Attribute-based encryption without key cloning International Journal of Applied Cryptography | 2012-11-16 | Paper |
Timed encryption with application to deniable key exchange Lecture Notes in Computer Science | 2012-07-16 | Paper |
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
A New Conditionally Anonymous Ring Signature Lecture Notes in Computer Science | 2011-08-17 | Paper |
Dwork-Naor ZAP and its application in deniable authentication, revisited Information Security and Cryptology | 2011-07-29 | Paper |
More efficient DDH pseudorandom generators Designs, Codes and Cryptography | 2010-03-26 | Paper |
Plaintext-awareness of hybrid encryption Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
An Efficient Deniable Key Exchange Protocol (Extended Abstract) Financial Cryptography and Data Security | 2009-02-12 | Paper |
Deniable Authentication on the Internet Information Security and Cryptology | 2009-02-10 | Paper |
Asymptotic Behavior of Normalized Linear Complexity of Ultimately Nonperiodic Binary Sequences IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Efficient Primitives from Exponentiation in ℤ p Information Security and Privacy | 2007-09-07 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Notes on \(q\)-ary interleaved sequences Chinese Science Bulletin | 2004-05-18 | Paper |
| scientific article; zbMATH DE number 1943100 (Why is no real title available?) | 2004-01-08 | Paper |
On interleaved sequences over finite fields Discrete Mathematics | 2002-08-29 | Paper |
| scientific article; zbMATH DE number 1740047 (Why is no real title available?) | 2002-05-14 | Paper |
Linear complexity of a sequence obtained from a periodic sequence by either substituting, inserting, or deleting k symbols within one period IEEE Transactions on Information Theory | 2000-09-07 | Paper |