| Publication | Date of Publication | Type |
|---|
| The security of ML-DSA against fault-injection attacks | 2026-03-31 | Paper |
| The security of hash-and-sign with retry against superposition attacks | 2025-07-29 | Paper |
| Signatures with memory-tight security in the quantum random oracle model | 2024-11-13 | Paper |
| Probabilistic hash-and-sign with retry in the quantum random oracle model | 2024-11-12 | Paper |
| Making the identity-based Diffie-Hellman key exchange efficiently revocable | 2024-10-16 | Paper |
| The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application | 2024-10-14 | Paper |
Post-quantum anonymity of Kyber Lecture Notes in Computer Science | 2023-11-24 | Paper |
Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Non-committing encryption with constant ciphertext expansion from standard assumptions | 2023-03-21 | Paper |
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 Designs, Codes and Cryptography | 2022-09-22 | Paper |
| Anonymity of NIST PQC round 3 KEMs | 2022-08-30 | Paper |
Quantum algorithm for the multicollision problem Theoretical Computer Science | 2020-10-12 | Paper |
| Post-quantum provably-secure authentication and MAC from Mersenne primes | 2020-08-05 | Paper |
| Quantum random oracle model with auxiliary input | 2020-05-20 | Paper |
Cryptanalysis of a rank-based signature with short public keys Designs, Codes and Cryptography | 2020-03-27 | Paper |
| (Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model | 2020-02-25 | Paper |
Improved quantum multicollision-finding algorithm (available as arXiv preprint) | 2020-02-25 | Paper |
| Cryptanalysis of compact-LWE | 2020-01-21 | Paper |
| Tightly-secure key-encapsulation mechanism in the quantum random oracle model | 2018-07-17 | Paper |
| Practical cryptanalysis of a public-key encryption scheme based on non-linear indeterminate equations at SAC 2017 | 2018-06-22 | Paper |
| Quantum multicollision-finding algorithm | 2018-03-08 | Paper |
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures Applied Cryptography and Network Security | 2016-03-10 | Paper |
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES Designs, Codes and Cryptography | 2015-09-30 | Paper |
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Strongly secure authenticated key exchange from factoring, codes, and lattices Designs, Codes and Cryptography | 2015-09-01 | Paper |
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Improved (hierarchical) inner-product encryption from lattices Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Security of Encryption Schemes in Weakened Random Oracle Models Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
Efficient public key encryption based on ideal lattices (extended abstract) Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge Provable Security | 2009-12-11 | Paper |
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Multi-bit Cryptosystems Based on Lattice Problems Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |