| Publication | Date of Publication | Type |
|---|
| Updatable, aggregatable, succinct mercurial vector commitment from lattice | 2024-11-12 | Paper |
| Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES} | 2024-10-14 | Paper |
| Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications | 2024-07-17 | Paper |
| Forced Independent Optimized Implementation of 4-Bit S-Box | 2023-04-13 | Paper |
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model 1511.68114 | 2022-12-21 | Paper |
| Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience | 2022-07-06 | Paper |
| LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks | 2021-12-08 | Paper |
| From quadratic functions to polynomials: generic functional encryption from standard assumptions | 2019-10-14 | Paper |
Faster algorithms for computing the R* consensus tree Algorithmica | 2016-12-21 | Paper |
Fully secure ciphertext-policy attribute based encryption with security mediator Information and Communications Security | 2016-12-19 | Paper |
Faster algorithms for computing the R* consensus tree Algorithms and Computation | 2015-09-11 | Paper |
Cochecker: detecting capability and sensitive data leaks from component chains in Android Information Security and Privacy | 2014-07-24 | Paper |
Non-adaptive complex group testing with multiple positive sets Theoretical Computer Science | 2014-01-16 | Paper |
PE(AR)\(^2\): Privacy-enhanced anonymous authentication with reputation and revocation Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Fully leakage-resilient signatures with auxiliary inputs Information Security and Privacy | 2012-09-07 | Paper |
Identity-based encryption resilient to continual auxiliary leakage Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Adaptive phenotype testing for AND/OR items Algorithms and Computation | 2011-12-16 | Paper |
Non-adaptive complex group testing with multiple positive sets Lecture Notes in Computer Science | 2011-07-01 | Paper |
Oblivious transfer with access control: realizing disjunction without duplication Lecture Notes in Computer Science | 2010-11-26 | Paper |
Indexing similar DNA sequences Algorithmic Aspects in Information and Management | 2010-07-20 | Paper |
Non-shared edges and nearest neighbor interchanges revisited Information Processing Letters | 2009-07-21 | Paper |
Identity Based Ring Signature: Why, How and What Next Public Key Infrastructure | 2009-04-23 | Paper |
Secure Role Activation and Authorization in the Enterprise Environment Public Key Infrastructure | 2009-04-23 | Paper |
An Experimental Study of Compressed Indexing and Local Alignments of DNA Combinatorial Optimization and Applications | 2009-03-03 | Paper |
Timed-Release Encryption Revisited Provable Security | 2009-01-27 | Paper |
Non-overlapping common substrings allowing mutations Mathematics in Computer Science | 2008-09-08 | Paper |
Space Efficient Indexes for String Matching with Don’t Cares Algorithms and Computation | 2008-05-27 | Paper |
Identity Based Threshold Ring Signature Lecture Notes in Computer Science | 2008-03-17 | Paper |
Delegation with supervision Information Sciences | 2007-10-10 | Paper |
Efficient Identity Based Ring Signature Applied Cryptography and Network Security | 2007-09-24 | Paper |
Event-Oriented k-Times Revocable-iff-Linked Group Signatures Information Security and Privacy | 2007-09-07 | Paper |
A space and time efficient algorithm for constructing compressed suffix arrays Algorithmica | 2007-07-19 | Paper |
Mathematical Foundations of Computer Science 2005 Lecture Notes in Computer Science | 2006-10-20 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
An efficient algorithm for finding dense regions for mining quantitative association rules Computers & Mathematics with Applications | 2006-02-06 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Forward-secure multisignature and blind signature schemes Applied Mathematics and Computation | 2005-11-04 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
SUBTREE TRANSFER DISTANCE FOR DEGREE-D PHYLOGENIES International Journal of Foundations of Computer Science | 2005-02-28 | Paper |
| scientific article; zbMATH DE number 2089995 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 1832314 (Why is no real title available?) | 2002-11-19 | Paper |
A generalized fortress problem using \(k\)-consecutive vertex guards Journal of Geometry | 2002-06-26 | Paper |
Edge guards for the fortress problem Journal of Geometry | 2001-01-01 | Paper |