| Publication | Date of Publication | Type |
|---|
| Improved lattice blind signatures from recycled entropy | 2026-02-04 | Paper |
Lattice signature with efficient protocols, application to anonymous credentials Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Pattern matching in encrypted stream from inner product encryption Lecture Notes in Computer Science | 2023-11-24 | Paper |
Advanced Signatures Asymmetric Cryptography | 2023-08-04 | Paper |
Public Key Encryption with Flexible Pattern Matching Lecture Notes in Computer Science | 2023-05-26 | Paper |
| Curves with Fast Computations in the First Pairing Group | 2023-03-22 | Paper |
| Lattice-based e-cash, revisited | 2023-03-21 | Paper |
| Group signature without random oracles from randomizable signatures | 2023-03-21 | Paper |
Practical dynamic group signatures without knowledge extractors Designs, Codes and Cryptography | 2023-03-17 | Paper |
| Improving revocation for group signature with redactable signature | 2021-12-21 | Paper |
| EPID with malicious revocation | 2021-12-20 | Paper |
| Efficient redactable signature and application to anonymous credentials | 2021-12-01 | Paper |
| Improved secure integer comparison via homomorphic encryption | 2020-08-05 | Paper |
| Divisible e-cash from constrained pseudo-random functions | 2020-05-20 | Paper |
| Reassessing security of randomizable signatures | 2020-01-21 | Paper |
| Pattern matching on encrypted streams | 2018-12-20 | Paper |
Cut down the tree to achieve constant complexity in divisible e-cash Lecture Notes in Computer Science | 2017-06-13 | Paper |
Trick or tweak: on the (in)security of OTR's tweaks Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Short randomizable signatures Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Scalable Divisible E-cash Applied Cryptography and Network Security | 2016-03-10 | Paper |
Divisible e-cash made practical Lecture Notes in Computer Science | 2015-08-27 | Paper |
Direct anonymous attestations with dependent basename opening Cryptology and Network Security | 2015-02-10 | Paper |
Forward secure non-interactive key exchange Lecture Notes in Computer Science | 2014-10-14 | Paper |
Toward generic method for server-aided cryptography Information and Communications Security | 2014-09-29 | Paper |
Delegating a pairing can be both secure and efficient Applied Cryptography and Network Security | 2014-07-07 | Paper |
Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Efficient group signatures in the standard model Lecture Notes in Computer Science | 2013-06-04 | Paper |