| Publication | Date of Publication | Type |
|---|
| Compact password authenticated key exchange from group actions | 2024-01-11 | Paper |
| Post-quantum anonymous one-sided authenticated key exchange without random oracles | 2023-08-10 | Paper |
| Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles | 2023-01-18 | Paper |
| Revocable hierarchical identity-based authenticated key exchange | 2022-12-07 | Paper |
| Formal verification of fair exchange based on Bitcoin smart contracts | 2022-07-06 | Paper |
| Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles | 2022-03-21 | Paper |
| Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency | 2020-07-20 | Paper |
| One-round authenticated group key exchange from isogenies | 2020-01-10 | Paper |
| Password-based authenticated key exchange from standard isogeny assumptions | 2020-01-10 | Paper |
| Supersingular isogeny Diffie-Hellman authenticated key exchange | 2019-03-29 | Paper |
| Single private-key generator security implies multiple private-key generators security | 2018-11-07 | Paper |
| UC-secure dynamic searchable symmetric encryption scheme | 2018-10-24 | Paper |
| Multi-cast key distribution: scalable, dynamic and provably secure construction | 2017-01-06 | Paper |
| Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures | 2016-03-10 | Paper |
| Compact public key encryption with minimum ideal property of hash functions | 2015-09-29 | Paper |
| Computational soundness of asymmetric bilinear pairing-based protocols | 2015-09-29 | Paper |
| Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs | 2015-09-11 | Paper |
| Strongly secure authenticated key exchange from factoring, codes, and lattices | 2015-09-01 | Paper |
| Secure Multi-Party Computation for Elliptic Curves | 2015-05-27 | Paper |
| Converting PKI-based authenticated key exchange to identity-based | 2015-02-10 | Paper |
| One-round authenticated key exchange without implementation trick | 2014-09-15 | Paper |
| Reset indifferentiability from weakened random oracle salvages one-pass hash functions | 2014-07-07 | Paper |
| Password-based authenticated key exchange without centralized trusted setup | 2014-07-07 | Paper |
| Constant rounds almost linear complexity multi-party computation for prefix sum | 2014-06-24 | Paper |
| Compact authenticated key exchange from bounded CCA-secure KEM | 2014-01-14 | Paper |
| One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary | 2013-04-04 | Paper |
| Two-party round-optimal session-policy attribute-based authenticated key exchange without random oracles | 2012-11-01 | Paper |
| Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices | 2012-07-20 | Paper |
| Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage | 2011-09-16 | Paper |
| Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model | 2011-09-16 | Paper |
| Rigorous security requirements for designated verifier signatures | 2011-07-29 | Paper |
| Strongly secure two-pass attribute-based authenticated key exchange | 2010-11-26 | Paper |
| How to confirm cryptosystems security: the original Merkle-Damgård is still alive! | 2009-12-15 | Paper |
| Leaky Random Oracle (Extended Abstract) | 2009-01-27 | Paper |
| Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) | 2009-01-22 | Paper |
| Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures | 2008-06-13 | Paper |
| Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks | 2008-04-17 | Paper |