| Publication | Date of Publication | Type |
|---|
| Cryptography based on transcendental numbers | 2024-07-11 | Paper |
| Cryptosystems for hierarchical groups | 2024-07-11 | Paper |
| Unconditionally secure distributed oblivious polynomial evaluation | 2019-03-29 | Paper |
| Improvements to almost optimum secret sharing with cheating detection | 2018-10-24 | Paper |
Security analysis of polynomial interpolation-based distributed oblivious transfer protocols Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
An ideal and robust threshold RSA Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
An information-theoretically secure threshold distributed oblivious transfer protocol Lecture Notes in Computer Science | 2013-06-04 | Paper |
Analysis of an unconditionally secure distributed oblivious transfer Journal of Cryptology | 2013-04-15 | Paper |
\(T\)-out-of-\(n\) distributed oblivious transfer protocols in non-adaptive and adaptive settings Information Security Practice and Experience | 2012-06-29 | Paper |
Multi-party computation with conversion of secret sharing Designs, Codes and Cryptography | 2012-03-01 | Paper |
Scalar product-based distributed oblivious transfer Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
A verifiable distributed oblivious transfer protocol Information Security and Privacy | 2011-07-07 | Paper |
Comments on Harn-Lin's cheating detection scheme Designs, Codes and Cryptography | 2011-06-03 | Paper |
On insecurity of Naor-Pinkas' distributed oblivious transfer Information Processing Letters | 2010-03-24 | Paper |
Comments on the `\(m\) out of \(n\) oblivious transfer' Information Processing Letters | 2009-12-18 | Paper |
Multi-Party Computation with Omnipresent Adversary Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Cryptanalysis of MV3 Stream Cipher Cryptology and Network Security | 2009-01-09 | Paper |
| scientific article; zbMATH DE number 1955792 (Why is no real title available?) | 2003-07-29 | Paper |
| scientific article; zbMATH DE number 1808275 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1612522 (Why is no real title available?) | 2001-07-01 | Paper |
Remarks on the multiple assignment secret sharing scheme Information and Communications Security | 2001-04-01 | Paper |
| scientific article; zbMATH DE number 1303971 (Why is no real title available?) | 1999-09-09 | Paper |
| scientific article; zbMATH DE number 1279022 (Why is no real title available?) | 1999-08-10 | Paper |
| scientific article; zbMATH DE number 1303966 (Why is no real title available?) | 1999-07-11 | Paper |
| scientific article; zbMATH DE number 1189397 (Why is no real title available?) | 1998-10-08 | Paper |
| scientific article; zbMATH DE number 1189396 (Why is no real title available?) | 1998-08-13 | Paper |