| Publication | Date of Publication | Type |
|---|
Compact password authenticated key exchange from group actions | 2024-01-11 | Paper |
Post-quantum anonymous one-sided authenticated key exchange without random oracles Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles | 2023-01-18 | Paper |
Revocable hierarchical identity-based authenticated key exchange | 2022-12-07 | Paper |
Formal verification of fair exchange based on Bitcoin smart contracts | 2022-07-06 | Paper |
Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles | 2022-03-21 | Paper |
Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency Information and Communications Security | 2020-07-20 | Paper |
One-round authenticated group key exchange from isogenies | 2020-01-10 | Paper |
Password-based authenticated key exchange from standard isogeny assumptions | 2020-01-10 | Paper |
Supersingular isogeny Diffie-Hellman authenticated key exchange | 2019-03-29 | Paper |
Single private-key generator security implies multiple private-key generators security | 2018-11-07 | Paper |
UC-secure dynamic searchable symmetric encryption scheme | 2018-10-24 | Paper |
Multi-cast key distribution: scalable, dynamic and provably secure construction Provable Security | 2017-01-06 | Paper |
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures Applied Cryptography and Network Security | 2016-03-10 | Paper |
Compact public key encryption with minimum ideal property of hash functions Provable Security | 2015-09-29 | Paper |
Computational soundness of asymmetric bilinear pairing-based protocols Provable Security | 2015-09-29 | Paper |
Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
Strongly secure authenticated key exchange from factoring, codes, and lattices Designs, Codes and Cryptography | 2015-09-01 | Paper |
Secure Multi-Party Computation for Elliptic Curves Advances in Information and Computer Security | 2015-05-27 | Paper |
Converting PKI-based authenticated key exchange to identity-based Cryptology and Network Security | 2015-02-10 | Paper |
One-round authenticated key exchange without implementation trick Advances in Information and Computer Security | 2014-09-15 | Paper |
Reset indifferentiability from weakened random oracle salvages one-pass hash functions Applied Cryptography and Network Security | 2014-07-07 | Paper |
Password-based authenticated key exchange without centralized trusted setup Applied Cryptography and Network Security | 2014-07-07 | Paper |
Constant rounds almost linear complexity multi-party computation for prefix sum Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Compact authenticated key exchange from bounded CCA-secure KEM Lecture Notes in Computer Science | 2014-01-14 | Paper |
One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary Advances in Information and Computer Security | 2013-04-04 | Paper |
Two-party round-optimal session-policy attribute-based authenticated key exchange without random oracles Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage Provable Security | 2011-09-16 | Paper |
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model Provable Security | 2011-09-16 | Paper |
Rigorous security requirements for designated verifier signatures Information Security and Cryptology | 2011-07-29 | Paper |
Strongly secure two-pass attribute-based authenticated key exchange Lecture Notes in Computer Science | 2010-11-26 | Paper |
How to confirm cryptosystems security: the original Merkle-Damgård is still alive! Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Leaky Random Oracle (Extended Abstract) Provable Security | 2009-01-27 | Paper |
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures Applied Cryptography and Network Security | 2008-06-13 | Paper |
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |