| Publication | Date of Publication | Type |
|---|
| Updatable, aggregatable, succinct mercurial vector commitment from lattice | 2024-11-12 | Paper |
| Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES} | 2024-10-14 | Paper |
| Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications | 2024-07-17 | Paper |
| Forced Independent Optimized Implementation of 4-Bit S-Box | 2023-04-13 | Paper |
| Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model | 2022-12-21 | Paper |
| Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience | 2022-07-06 | Paper |
| LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks | 2021-12-08 | Paper |
| From quadratic functions to polynomials: generic functional encryption from standard assumptions | 2019-10-14 | Paper |
| Faster algorithms for computing the R* consensus tree | 2016-12-21 | Paper |
| Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator | 2016-12-19 | Paper |
| Faster Algorithms for Computing the R* Consensus Tree | 2015-09-11 | Paper |
| CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android | 2014-07-24 | Paper |
| Non-adaptive complex group testing with multiple positive sets | 2014-01-16 | Paper |
| PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation | 2013-10-23 | Paper |
| Fully Leakage-Resilient Signatures with Auxiliary Inputs | 2012-09-07 | Paper |
| Identity-Based Encryption Resilient to Continual Auxiliary Leakage | 2012-06-29 | Paper |
| Adaptive Phenotype Testing for AND/OR Items | 2011-12-16 | Paper |
| Non-adaptive Complex Group Testing with Multiple Positive Sets | 2011-07-01 | Paper |
| Oblivious Transfer with Access Control : Realizing Disjunction without Duplication | 2010-11-26 | Paper |
| Indexing Similar DNA Sequences | 2010-07-20 | Paper |
| Non-shared edges and nearest neighbor interchanges revisited | 2009-07-21 | Paper |
| Identity Based Ring Signature: Why, How and What Next | 2009-04-23 | Paper |
| Secure Role Activation and Authorization in the Enterprise Environment | 2009-04-23 | Paper |
| An Experimental Study of Compressed Indexing and Local Alignments of DNA | 2009-03-03 | Paper |
| Timed-Release Encryption Revisited | 2009-01-27 | Paper |
| Non-overlapping common substrings allowing mutations | 2008-09-08 | Paper |
| Space Efficient Indexes for String Matching with Don’t Cares | 2008-05-27 | Paper |
| Identity Based Threshold Ring Signature | 2008-03-17 | Paper |
| Delegation with supervision | 2007-10-10 | Paper |
| Efficient Identity Based Ring Signature | 2007-09-24 | Paper |
| Event-Oriented k-Times Revocable-iff-Linked Group Signatures | 2007-09-07 | Paper |
| A space and time efficient algorithm for constructing compressed suffix arrays | 2007-07-19 | Paper |
| Mathematical Foundations of Computer Science 2005 | 2006-10-20 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| An efficient algorithm for finding dense regions for mining quantitative association rules | 2006-02-06 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Forward-secure multisignature and blind signature schemes | 2005-11-04 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| SUBTREE TRANSFER DISTANCE FOR DEGREE-D PHYLOGENIES | 2005-02-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4808661 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4778751 | 2002-11-19 | Paper |
| A generalized fortress problem using \(k\)-consecutive vertex guards | 2002-06-26 | Paper |
| Edge guards for the fortress problem | 2001-01-01 | Paper |