| Publication | Date of Publication | Type |
|---|
| On digital signatures based on group actions: QROM security and ring signatures | 2025-01-31 | Paper |
Improved computation of polynomial roots over number fields when using complex embeddings Journal of Computational Algebra | 2025-01-27 | Paper |
On polynomial modular number systems over \(\mathbb{Z}/p\mathbb{Z}\) Advances in Mathematics of Communications | 2024-06-17 | Paper |
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy Information Security Practice and Experience | 2022-12-09 | Paper |
| Using Freivalds' algorithm to accelerate lattice-based signature verifications | 2022-08-30 | Paper |
| Practical post-quantum signature schemes from isomorphism problems of trilinear forms | 2022-08-30 | Paper |
Lattice blind signatures with forward security (available as arXiv preprint) | 2021-06-08 | Paper |
Short principal ideal problem in multicubic fields Journal of Mathematical Cryptology | 2021-05-03 | Paper |
| Improving the security of the DRS scheme with uniformly chosen random noise | 2020-05-27 | Paper |
| On Polynomial Modular Number Systems over $\mathbb{Z}/p\mathbb{Z}$ | 2020-01-11 | Paper |
Enhancing Goldreich, Goldwasser and Halevi's scheme with intersecting lattices Journal of Mathematical Cryptology | 2019-11-28 | Paper |
Subquadratic Space Complexity Binary Field Multiplier Using Double Polynomial Representation IEEE Transactions on Computers | 2017-07-27 | Paper |
Enhanced digital signature using RNS digit exponent representation Arithmetic of Finite Fields | 2017-06-13 | Paper |
Lattice Reduction for Modular Knapsack Selected Areas in Cryptography | 2015-12-04 | Paper |
Efficient dynamic provable data possession with public verifiability and data privacy Information Security and Privacy | 2015-10-20 | Paper |
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme Designs, Codes and Cryptography | 2015-09-29 | Paper |
Privacy-preserving encryption scheme using DNA parentage test Theoretical Computer Science | 2015-05-18 | Paper |
Adaptive precision floating point LLL Information Security and Privacy | 2013-06-28 | Paper |
Reaction attack on outsourced computing with fully homomorphic encryption schemes Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
On the CCA-1 security of somewhat homomorphic encryption over the integers Information Security Practice and Experience | 2012-06-29 | Paper |
Improvement of lattice-based cryptography using CRT Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering | 2010-12-21 | Paper |
Recursive lattice reduction Lecture Notes in Computer Science | 2010-09-10 | Paper |
Efficient lattice-based signature scheme International Journal of Applied Cryptography | 2009-02-24 | Paper |
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation Information Security and Privacy | 2008-07-08 | Paper |
A Digital Signature Scheme Based on CVP ∞ Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |