| Publication | Date of Publication | Type |
|---|
Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity Theoretical Computer Science | 2024-08-27 | Paper |
Server-aided revocable attribute-based encryption resilient to decryption key exposure Cryptology and Network Security | 2023-08-02 | Paper |
| Improved security model for public-key authenticated encryption with keyword search | 2023-04-13 | Paper |
| Server-aided revocable attribute-based encryption | 2022-08-19 | Paper |
Server-aided revocable identity-based encryption Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
| Forward-secure revocable identity-based encryption | 2022-06-08 | Paper |
Non-malleable functions and their applications Journal of Cryptology | 2022-04-04 | Paper |
Public-key authenticated encryption with keyword search revisited: security model and constructions Information Sciences | 2021-03-31 | Paper |
Key regeneration-free ciphertext-policy attribute-based encryption and its application Information Sciences | 2021-03-31 | Paper |
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance Information Sciences | 2020-12-10 | Paper |
Robust digital signature revisited Theoretical Computer Science | 2020-10-21 | Paper |
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman Information Sciences | 2020-02-07 | Paper |
| Regularly lossy functions and applications | 2020-01-21 | Paper |
Escrow free attribute-based signature with self-revealability Information Sciences | 2020-01-06 | Paper |
| Fuzzy public-key encryption based on biometric data | 2018-11-07 | Paper |
Regular lossy functions and their applications in leakage-resilient cryptography Theoretical Computer Science | 2018-06-18 | Paper |
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness Designs, Codes and Cryptography | 2018-04-06 | Paper |
Public key encryption resilient to leakage and tampering attacks Journal of Computer and System Sciences | 2017-09-07 | Paper |
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains IEEE Transactions on Computers | 2017-05-16 | Paper |
How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks Information Security and Cryptology | 2017-05-05 | Paper |
Non-malleable functions and their applications Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited International Journal of Applied Mathematics and Computer Science | 2015-10-16 | Paper |
Continuous non-malleable key derivation and its application to related-key security Lecture Notes in Computer Science | 2015-08-27 | Paper |
Leakage-flexible CCA-secure public-key encryption: simple construction and free of pairing Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Key-dependent message chosen-ciphertext security of the Cramer-Shoup cryptosystem Information Security and Privacy | 2013-06-28 | Paper |
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
New left-to-right minimal weight signed-digit radix-\(r\) representation Computers and Electrical Engineering | 2009-04-17 | Paper |