| Publication | Date of Publication | Type |
|---|
| Dually computable cryptographic accumulators and their application to attribute based encryption | 2024-06-05 | Paper |
(Augmented) broadcast encryption from identity based encryption with wildcard Cryptology and Network Security | 2023-07-28 | Paper |
| Constant-size lattice-based group signature with forward security in the standard model | 2023-03-21 | Paper |
Blind Functional Encryption 1511.68112 | 2022-12-21 | Paper |
| Post-quantum online voting scheme | 2022-06-01 | Paper |
| Symmetric-key authenticated key exchange (SAKE) with perfect forward secrecy | 2020-08-05 | Paper |
| Extended 3-party ACCE and application to LoRaWAN 1.1 | 2020-05-06 | Paper |
| Verifiable message-locked encryption | 2018-10-26 | Paper |
| A new technique for compacting secret key in attribute-based broadcast encryption | 2018-10-26 | Paper |
Certificateless public key cryptography in the standard model Fundamenta Informaticae | 2018-09-21 | Paper |
| Privacy-preserving plaintext-equality of low-entropy inputs | 2018-08-10 | Paper |
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption Theoretical Computer Science | 2018-04-04 | Paper |
Scalable Divisible E-cash Applied Cryptography and Network Security | 2016-03-10 | Paper |
Low-cost cryptography for privacy in RFID systems Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
Combined Proxy Re-encryption Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Divisible e-cash made practical Lecture Notes in Computer Science | 2015-08-27 | Paper |
Toward generic method for server-aided cryptography Information and Communications Security | 2014-09-29 | Paper |
Delegating a pairing can be both secure and efficient Applied Cryptography and Network Security | 2014-07-07 | Paper |
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
On the implementation of a pairing-based cryptographic protocol in a constrained device Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Sanitizable signatures with several signers and sanitizers Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Plaintext-checkable encryption Lecture Notes in Computer Science | 2012-06-08 | Paper |
Group signatures are suitable for constrained devices Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Achieving optimal anonymity in transferable e-cash with a judge Lecture Notes in Computer Science | 2011-06-29 | Paper |
Lighten encryption schemes for secure and private RFID systems Financial Cryptography and Data Security | 2010-08-17 | Paper |
On extended sanitizable signature schemes Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Group Key Management: From a Non-hierarchical to a Hierarchical Structure Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Defeating Malicious Servers in a Blind Signatures Based Voting System Financial Cryptography and Data Security | 2008-09-09 | Paper |
Trapdoor Sanitizable Signatures and Their Application to Content Protection Applied Cryptography and Network Security | 2008-06-13 | Paper |
Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use Provable Security | 2008-06-10 | Paper |
Divisible E-Cash Systems Can Be Truly Anonymous Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
List signature schemes Discrete Applied Mathematics | 2006-04-28 | Paper |
| scientific article; zbMATH DE number 2043325 (Why is no real title available?) | 2004-02-16 | Paper |