| Publication | Date of Publication | Type |
|---|
Efficient secure multi-party computation for proof of custody in Ethereum sharding Designs, Codes and Cryptography | 2024-06-28 | Paper |
Forward security of Fiat-Shamir lattice signatures | 2023-11-09 | Paper |
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols Lecture Notes in Computer Science | 2023-05-26 | Paper |
Fast Fourier Orthogonalization over NTRU Lattices | 2022-12-09 | Paper |
Updatable hash proof system and its applications Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
More efficient construction of anonymous signatures | 2022-06-08 | Paper |
An efficient CCA-secure access control encryption for any policy | 2021-12-08 | Paper |
Fully secure ABE with outsourced decryption against chosen ciphertext attack | 2021-12-08 | Paper |
Distributed key generation for SM9-based systems | 2021-12-08 | Paper |
Key dependent message security for revocable identity-based encryption and identity-based encryption | 2021-01-18 | Paper |
Certifying variant of RSA with generalized moduli | 2021-01-18 | Paper |
Tightly secure two-pass authenticated key exchange protocol in the CK model | 2020-08-05 | Paper |
Reducing randomness complexity of mask refreshing algorithm Information and Communications Security | 2020-07-20 | Paper |
Multipurpose public-key encryption | 2018-10-24 | Paper |
A deterministic algorithm for computing divisors in an interval Information Security and Privacy | 2018-09-26 | Paper |
scientific article; zbMATH DE number 6874618 (Why is no real title available?) | 2018-05-25 | Paper |
An approach for mitigating potential threats in practical SSO systems Information Security and Cryptology | 2016-07-25 | Paper |
Solving linear equations modulo unknown divisors: revisited Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Towards optimal bounds for implicit factorization problem Lecture Notes in Computer Science | 2016-05-19 | Paper |
A solution of code authentication on android Information and Communications Security | 2016-04-21 | Paper |
Simpler CCA-secure public key encryption from lossy trapdoor functions Information Security and Cryptology | 2015-11-25 | Paper |
Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism Journal of Computer Science and Technology | 2014-10-07 | Paper |
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents Applied Cryptography and Network Security | 2014-07-07 | Paper |
Improved bounds for the implicit factorization problem Advances in Mathematics of Communications | 2013-07-31 | Paper |
Factoring multi-power RSA modulus \(N = p^r q\) with partial known bits Information Security and Privacy | 2013-06-28 | Paper |
Stronger Security Model for Public-Key Encryption with Equality Test Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
A generic construction from selective-IBE to public-key encryption with non-interactive opening Information Security and Cryptology | 2013-01-07 | Paper |
Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting Lecture Notes in Computer Science | 2012-09-25 | Paper |
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts Information Security and Privacy | 2012-09-07 | Paper |
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
Efficient threshold encryption from lossy trapdoor functions Post-Quantum Cryptography | 2011-11-25 | Paper |
Acquiring key privacy from data privacy Information Security and Cryptology | 2011-07-29 | Paper |
Constructing Better KEMs with Partial Message Recovery Information Security and Cryptology | 2010-11-23 | Paper |
Generic Construction of Stateful Identity Based Encryption Lecture Notes in Computer Science | 2009-09-29 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Strong Anonymous Signatures Information Security and Cryptology | 2009-04-29 | Paper |
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions Applied Cryptography and Network Security | 2009-03-10 | Paper |
Orthogonality between Key Privacy and Data Privacy, Revisited Information Security and Cryptology | 2009-02-10 | Paper |
Efficient Identity-Based Encryption with Tight Security Reduction Cryptology and Network Security | 2009-01-09 | Paper |
Relations Among Notions of Security for Identity Based Encryption Schemes LATIN 2006: Theoretical Informatics | 2008-09-18 | Paper |
Formal Security Treatments for Signatures from Identity-Based Encryption Provable Security | 2008-06-10 | Paper |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption Cryptology and Network Security | 2008-04-15 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Short Signature and Universal Designated Verifier Signature Without Random Oracles Applied Cryptography and Network Security | 2007-09-24 | Paper |
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT Information Security and Privacy | 2007-09-07 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |