| Publication | Date of Publication | Type |
|---|
Revocable hierarchical identity-based authenticated key exchange | 2022-12-07 | Paper |
Strongly secure identity-based key exchange with single pairing operation | 2022-08-25 | Paper |
Accelerating beta Weil pairing with precomputation and multi-pairing techniques | 2021-02-23 | Paper |
How to circumvent the two-ciphertext lower bound for linear garbling schemes Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Garbling scheme for formulas with constant size of garbled gates Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Strongly secure authenticated key exchange from factoring, codes, and lattices Designs, Codes and Cryptography | 2015-09-01 | Paper |
Secure Multi-Party Computation for Elliptic Curves Advances in Information and Computer Security | 2015-05-27 | Paper |
Converting PKI-based authenticated key exchange to identity-based Cryptology and Network Security | 2015-02-10 | Paper |
Constant rounds almost linear complexity multi-party computation for prefix sum Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Sufficient condition for identity-based authenticated key exchange resilient to leakage of secret keys Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange Information Security and Privacy | 2012-09-07 | Paper |
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Secure combinatorial auctions by dynamic programming with polynomial secret sharing Financial Cryptography | 2011-04-20 | Paper |
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys Lecture Notes in Computer Science | 2010-11-26 | Paper |
Anonymizable signature and its construction from pairings Lecture Notes in Computer Science | 2010-11-26 | Paper |
Modeling leakage of ephemeral secrets in tripartite/group key exchange Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Secure generalized Vickrey auction using homomorphic encryption Lecture Notes in Computer Science | 2010-03-31 | Paper |
Relinkable Ring Signature Cryptology and Network Security | 2009-11-26 | Paper |
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Secure distributed constraint satisfaction: reaching agreement without revealing private information Artificial Intelligence | 2007-10-23 | Paper |
Traceable Ring Signature Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Financial Cryptography Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 2085425 (Why is no real title available?) | 2004-08-09 | Paper |
1-out-of-n Signatures from a Variety of Keys Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1941238 (Why is no real title available?) | 2003-06-29 | Paper |
ON THE TURAEV-VIRO-OCNEANU INVARIANT OF 3-MANIFOLDS DERIVED FROMTHE E6-SUBFACTOR Kyushu Journal of Mathematics | 2002-11-04 | Paper |
scientific article; zbMATH DE number 1689604 (Why is no real title available?) | 2002-01-13 | Paper |
\(E_6\) Turaev-Viro-Ocneanu invariant of lens space \(L(p,1)\) | 2002-01-02 | Paper |
scientific article; zbMATH DE number 1379300 (Why is no real title available?) | 1999-12-15 | Paper |