| Publication | Date of Publication | Type |
|---|
| Efficient secure multi-party computation for proof of custody in Ethereum sharding | 2024-06-28 | Paper |
| Forward security of Fiat-Shamir lattice signatures | 2023-11-09 | Paper |
| Modular Design of Role-Symmetric Authenticated Key Exchange Protocols | 2023-05-26 | Paper |
| Fast Fourier Orthogonalization over NTRU Lattices | 2022-12-09 | Paper |
| Updatable hash proof system and its applications | 2022-08-19 | Paper |
| More efficient construction of anonymous signatures | 2022-06-08 | Paper |
| An efficient CCA-secure access control encryption for any policy | 2021-12-08 | Paper |
| Fully secure ABE with outsourced decryption against chosen ciphertext attack | 2021-12-08 | Paper |
| Distributed key generation for SM9-based systems | 2021-12-08 | Paper |
| Key dependent message security for revocable identity-based encryption and identity-based encryption | 2021-01-18 | Paper |
| Certifying variant of RSA with generalized moduli | 2021-01-18 | Paper |
| Tightly secure two-pass authenticated key exchange protocol in the CK model | 2020-08-05 | Paper |
| Reducing randomness complexity of mask refreshing algorithm | 2020-07-20 | Paper |
| Multipurpose public-key encryption | 2018-10-24 | Paper |
| A deterministic algorithm for computing divisors in an interval | 2018-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4640755 | 2018-05-25 | Paper |
| An approach for mitigating potential threats in practical SSO systems | 2016-07-25 | Paper |
| Solving linear equations modulo unknown divisors: revisited | 2016-06-10 | Paper |
| Towards optimal bounds for implicit factorization problem | 2016-05-19 | Paper |
| A solution of code authentication on android | 2016-04-21 | Paper |
| Simpler CCA-secure public key encryption from lossy trapdoor functions | 2015-11-25 | Paper |
| Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism | 2014-10-07 | Paper |
| New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents | 2014-07-07 | Paper |
| Improved bounds for the implicit factorization problem | 2013-07-31 | Paper |
| Factoring multi-power RSA modulus \(N = p^r q\) with partial known bits | 2013-06-28 | Paper |
| Stronger Security Model for Public-Key Encryption with Equality Test | 2013-04-04 | Paper |
| A generic construction from selective-IBE to public-key encryption with non-interactive opening | 2013-01-07 | Paper |
| Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting | 2012-09-25 | Paper |
| Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts | 2012-09-07 | Paper |
| Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
| Efficient threshold encryption from lossy trapdoor functions | 2011-11-25 | Paper |
| Acquiring key privacy from data privacy | 2011-07-29 | Paper |
| Constructing Better KEMs with Partial Message Recovery | 2010-11-23 | Paper |
| Generic Construction of Stateful Identity Based Encryption | 2009-09-29 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Strong Anonymous Signatures | 2009-04-29 | Paper |
| Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions | 2009-03-10 | Paper |
| Orthogonality between Key Privacy and Data Privacy, Revisited | 2009-02-10 | Paper |
| Efficient Identity-Based Encryption with Tight Security Reduction | 2009-01-09 | Paper |
| Relations Among Notions of Security for Identity Based Encryption Schemes | 2008-09-18 | Paper |
| Formal Security Treatments for Signatures from Identity-Based Encryption | 2008-06-10 | Paper |
| Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption | 2008-04-15 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Short Signature and Universal Designated Verifier Signature Without Random Oracles | 2007-09-24 | Paper |
| Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT | 2007-09-07 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |