| Publication | Date of Publication | Type |
|---|
Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography Advances in Mathematics of Communications | 2024-06-17 | Paper |
Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks Lecture Notes in Computer Science | 2023-05-12 | Paper |
Short attribute-based signatures for arbitrary Turing machines from standard assumptions Designs, Codes and Cryptography | 2023-04-28 | Paper |
Grover on \(SIMON\) Quantum Information Processing | 2023-02-03 | Paper |
| Evaluation of quantum cryptanalysis on SPECK | 2022-07-06 | Paper |
Group signature from lattices preserving forward security in dynamic setting Advances in Mathematics of Communications | 2020-11-07 | Paper |
| Construction for a nominative signature scheme from lattice with enhanced security | 2019-10-14 | Paper |
Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation Algorithmica | 2019-08-20 | Paper |
| Differential fault attack on SIMON with very few faults | 2019-03-29 | Paper |
Measurement-device-independent quantum private query with qutrits International Journal of Quantum Information | 2019-02-08 | Paper |
| Fully secure online/offline predicate and attribute-based encryption | 2018-12-07 | Paper |
| New constructions of T-function | 2018-12-07 | Paper |
| General circuit realizing compact revocable attribute-based encryption from multilinear maps | 2018-10-18 | Paper |
Constrained pseudorandom functions for unconstrained inputs revisited: achieving verifiability and key delegation Lecture Notes in Computer Science | 2017-06-13 | Paper |
Strongly full-hiding inner product encryption Theoretical Computer Science | 2017-02-22 | Paper |
Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
Functional encryption for inner product with full function privacy Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Functional signcryption: notion, construction, and applications Provable Security | 2016-01-27 | Paper |
Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Fully secure self-updatable encryption in prime order bilinear groups Lecture Notes in Computer Science | 2015-11-03 | Paper |
Algebraic cryptanalysis of stream ciphers using decomposition of Boolean function Journal of Applied Mathematics and Computing | 2015-10-07 | Paper |
Unconditionally-secure key pre-distribution for triangular grid based wireless sensor network Journal of Applied Mathematics and Computing | 2014-08-05 | Paper |
Key pre-distribution in a non-uniform rectangular grid for wireless sensor networks Journal of Applied Mathematics and Computing | 2014-08-05 | Paper |
Universally composable efficient priced oblivious transfer from a flexible membership encryption Information Security and Privacy | 2014-07-24 | Paper |
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains Applied Cryptography and Network Security | 2009-03-10 | Paper |
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Improved Time-Memory Trade-Offs with Multiple Data Selected Areas in Cryptography | 2007-11-15 | Paper |