| Publication | Date of Publication | Type |
|---|
| Compact password authenticated key exchange from group actions | 2024-01-11 | Paper |
| Post-quantum anonymous one-sided authenticated key exchange without random oracles | 2023-08-10 | Paper |
| Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles | 2023-01-18 | Paper |
| Revocable hierarchical identity-based authenticated key exchange | 2022-12-07 | Paper |
| Formal verification of fair exchange based on Bitcoin smart contracts | 2022-07-06 | Paper |
| Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles | 2022-03-21 | Paper |
| Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency | 2020-07-20 | Paper |
| One-round authenticated group key exchange from isogenies | 2020-01-10 | Paper |
| Password-based authenticated key exchange from standard isogeny assumptions | 2020-01-10 | Paper |
| Supersingular isogeny Diffie-Hellman authenticated key exchange | 2019-03-29 | Paper |
| Single private-key generator security implies multiple private-key generators security | 2018-11-07 | Paper |
| UC-secure dynamic searchable symmetric encryption scheme | 2018-10-24 | Paper |
| Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction | 2017-01-06 | Paper |
| Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures | 2016-03-10 | Paper |
| Compact Public Key Encryption with Minimum Ideal Property of Hash Functions | 2015-09-29 | Paper |
| Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols | 2015-09-29 | Paper |
| Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs | 2015-09-11 | Paper |
| Strongly secure authenticated key exchange from factoring, codes, and lattices | 2015-09-01 | Paper |
| Secure Multi-Party Computation for Elliptic Curves | 2015-05-27 | Paper |
| Converting PKI-Based Authenticated Key Exchange to Identity-Based | 2015-02-10 | Paper |
| One-Round Authenticated Key Exchange without Implementation Trick | 2014-09-15 | Paper |
| Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions | 2014-07-07 | Paper |
| Password-Based Authenticated Key Exchange without Centralized Trusted Setup | 2014-07-07 | Paper |
| Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum | 2014-06-24 | Paper |
| Compact Authenticated Key Exchange from Bounded CCA-Secure KEM | 2014-01-14 | Paper |
| One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary | 2013-04-04 | Paper |
| Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles | 2012-11-01 | Paper |
| Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices | 2012-07-20 | Paper |
| Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage | 2011-09-16 | Paper |
| Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model | 2011-09-16 | Paper |
| Rigorous Security Requirements for Designated Verifier Signatures | 2011-07-29 | Paper |
| Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange | 2010-11-26 | Paper |
| How to confirm cryptosystems security: the original Merkle-Damgård is still alive! | 2009-12-15 | Paper |
| Leaky Random Oracle (Extended Abstract) | 2009-01-27 | Paper |
| Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) | 2009-01-22 | Paper |
| Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures | 2008-06-13 | Paper |
| Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks | 2008-04-17 | Paper |