| Publication | Date of Publication | Type |
|---|
| Efficient secure multi-party computation for proof of custody in Ethereum sharding | 2024-06-28 | Paper |
| Forward security of Fiat-Shamir lattice signatures | 2023-11-09 | Paper |
| Modular Design of Role-Symmetric Authenticated Key Exchange Protocols | 2023-05-26 | Paper |
| Fast Fourier Orthogonalization over NTRU Lattices | 2022-12-09 | Paper |
| Updatable Hash Proof System and Its Applications | 2022-08-19 | Paper |
| More efficient construction of anonymous signatures | 2022-06-08 | Paper |
| An efficient CCA-secure access control encryption for any policy | 2021-12-08 | Paper |
| Fully secure ABE with outsourced decryption against chosen ciphertext attack | 2021-12-08 | Paper |
| Distributed key generation for SM9-based systems | 2021-12-08 | Paper |
| Key dependent message security for revocable identity-based encryption and identity-based encryption | 2021-01-18 | Paper |
| Certifying variant of RSA with generalized moduli | 2021-01-18 | Paper |
| Tightly secure two-pass authenticated key exchange protocol in the CK model | 2020-08-05 | Paper |
| Reducing Randomness Complexity of Mask Refreshing Algorithm | 2020-07-20 | Paper |
| Multipurpose public-key encryption | 2018-10-24 | Paper |
| A Deterministic Algorithm for Computing Divisors in an Interval | 2018-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4640755 | 2018-05-25 | Paper |
| An Approach for Mitigating Potential Threats in Practical SSO Systems | 2016-07-25 | Paper |
| Solving Linear Equations Modulo Unknown Divisors: Revisited | 2016-06-10 | Paper |
| Towards Optimal Bounds for Implicit Factorization Problem | 2016-05-19 | Paper |
| A Solution of Code Authentication on Android | 2016-04-21 | Paper |
| Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions | 2015-11-25 | Paper |
| Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism | 2014-10-07 | Paper |
| New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents | 2014-07-07 | Paper |
| Improved bounds for the implicit factorization problem | 2013-07-31 | Paper |
| Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits | 2013-06-28 | Paper |
| Stronger Security Model for Public-Key Encryption with Equality Test | 2013-04-04 | Paper |
| A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening | 2013-01-07 | Paper |
| Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting | 2012-09-25 | Paper |
| Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts | 2012-09-07 | Paper |
| Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
| Efficient Threshold Encryption from Lossy Trapdoor Functions | 2011-11-25 | Paper |
| Acquiring Key Privacy from Data Privacy | 2011-07-29 | Paper |
| Constructing Better KEMs with Partial Message Recovery | 2010-11-23 | Paper |
| Generic Construction of Stateful Identity Based Encryption | 2009-09-29 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Strong Anonymous Signatures | 2009-04-29 | Paper |
| Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions | 2009-03-10 | Paper |
| Orthogonality between Key Privacy and Data Privacy, Revisited | 2009-02-10 | Paper |
| Efficient Identity-Based Encryption with Tight Security Reduction | 2009-01-09 | Paper |
| Relations Among Notions of Security for Identity Based Encryption Schemes | 2008-09-18 | Paper |
| Formal Security Treatments for Signatures from Identity-Based Encryption | 2008-06-10 | Paper |
| Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption | 2008-04-15 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Short Signature and Universal Designated Verifier Signature Without Random Oracles | 2007-09-24 | Paper |
| Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT | 2007-09-07 | Paper |
| Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2007-02-12 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |