| Publication | Date of Publication | Type |
|---|
| PFE: linear active security, double-shuffle proofs, and low-complexity communication | 2024-07-17 | Paper |
| Constant-round multiparty private function evaluation with (quasi-)linear complexities | 2023-11-10 | Paper |
| SecureBiNN: 3-party secure computation for binarized neural network inference | 2023-07-28 | Paper |
| CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN | 2021-09-06 | Paper |
| Simpler CCA secure PKE from LPN problem without double-trapdoor | 2021-01-18 | Paper |
| CCA secure multi-recipient KEM from LPN | 2021-01-18 | Paper |
| Collision resistant hashing from sub-exponential learning parity with noise | 2020-05-05 | Paper |
| On the robustness of learning parity with noise | 2018-10-26 | Paper |
| An effective localization attack in location-based social network | 2016-10-06 | Paper |
| Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations | 2016-08-31 | Paper |
| Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption | 2016-07-11 | Paper |
| (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond | 2015-12-10 | Paper |
| The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions | 2015-07-06 | Paper |
| Optimal assignment schemes for general access structures based on linear programming | 2015-03-12 | Paper |
| Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model | 2015-02-19 | Paper |
| Pseudorandom generators from regular one-way functions: new constructions with improved parameters | 2015-01-28 | Paper |
| Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model | 2014-09-29 | Paper |
| Efficient democratic group signatures with threshold traceability | 2014-09-02 | Paper |
| An efficient threshold key-insulated signature scheme | 2014-03-27 | Paper |
| Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree | 2014-01-28 | Paper |
| Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles | 2014-01-24 | Paper |
| Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters | 2013-12-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4925068 | 2013-06-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4917450 | 2013-04-30 | Paper |
| Pitfalls in identity based encryption using an elliptic curve combined public key | 2012-08-30 | Paper |
| Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator | 2012-07-23 | Paper |
| Cryptanalysis of a certificateless signcryption scheme in the standard model | 2011-01-28 | Paper |
| Distributed certificateless key encapsulation mechanism secure against the adaptive adversary | 2011-01-05 | Paper |
| A universal composability framework for analysis of proxy threshold signature | 2011-01-05 | Paper |
| Identity-Based Strong Key-Insulated Signature Without Random Oracles | 2010-02-12 | Paper |
| Democratic group signatures with collective traceability | 2009-10-15 | Paper |
| Identity-Based Key-Insulated Signature with Secure Key-Updates | 2009-01-15 | Paper |
| Efficient Partially Blind Signature Scheme with Provable Security | 2007-09-10 | Paper |
| Simulatability and security of certificateless threshold signatures | 2007-02-20 | Paper |
| Verifiable encrypted signatures without random oracles | 2006-11-15 | Paper |
| ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings | 2005-11-16 | Paper |