| Publication | Date of Publication | Type |
|---|
| Leakage certification made simple | 2024-12-13 | Paper |
| Interaction of liquid crystals with a rigid body | 2024-10-30 | Paper |
| Max-flow min-cut theorem in quantum computing | 2024-08-26 | Paper |
| Integer numeric multiplication using quantum Fourier transform | 2024-08-20 | Paper |
| Applying Grover's algorithm to implement various numerical and comparison operations | 2024-07-25 | Paper |
| Global existence of weak solutions for a model of nematic liquid crystal-colloidal interactions | 2024-07-12 | Paper |
| Not optimal but efficient: a distinguisher based on the Kruskal-Wallis test | 2024-05-31 | Paper |
| Motion of several rigid bodies in a compressible fluid-mixed case | 2024-01-05 | Paper |
| PIE: \(p\)-adic encoding for high-precision arithmetic in homomorphic encryption | 2023-11-09 | Paper |
| Strong well-posedness and dynamics of a nematic liquid crystal-colloidal interaction model | 2023-10-26 | Paper |
| Nonlinear theory remedies the lack of invertibility in time periodic fluid flows | 2023-10-24 | Paper |
| Global existence of Weak Solutions for a model of nematic liquid crystal-colloidal interactions | 2023-10-24 | Paper |
| On the motion of a nearly incompressible viscous fluid containing a small rigid body | 2023-09-25 | Paper |
| On the motion of a small rigid body in a viscous compressible fluid | 2023-07-24 | Paper |
| Wellposedness of Boussinesq system | 2023-06-19 | Paper |
| On the motion of a large number of small rigid bodies in a viscous incompressible fluid | 2023-06-09 | Paper |
| Time-release cryptography from minimal circuit assumptions | 2023-05-12 | Paper |
| Minicrypt primitives with algebraic structure and applications | 2023-01-05 | Paper |
| Annealing-based algorithm for solving CVP and SVP | 2022-11-25 | Paper |
| Collision/No-collision results of a solid body with its container in a 3D compressible viscous fluid | 2022-10-10 | Paper |
| Motion of a rigid body in a compressible fluid with Navier-slip boundary condition | 2022-09-27 | Paper |
| Feistel structures for MPC, and more | 2022-08-25 | Paper |
| Compressible Navier-Stokes system with the hard sphere pressure law in an exterior domain | 2022-08-25 | Paper |
| Existence of a weak solution to a nonlinear fluid-structure interaction problem with heat exchange | 2022-08-08 | Paper |
| Leveraging special-purpose hardware for local search heuristics | 2022-04-12 | Paper |
| Interpolation cryptanalysis of unbalanced Feistel networks with low degree round functions | 2022-03-25 | Paper |
| Existence and uniqueness of maximal strong solution of a 1D blood flow in a network of vessels | 2021-12-15 | Paper |
| Approximate controllability and stabilizability of a linearized system for the interaction between a viscoelastic fluid and a rigid body | 2021-12-13 | Paper |
| Compactness of hashing modes and efficiency beyond Merkle tree | 2021-12-08 | Paper |
| An overview of queuing delay and various delay based algorithms in networks | 2021-11-11 | Paper |
| Investigations into transient wakes behind a custom airfoil undergoing pitching motion | 2021-09-20 | Paper |
| Self-propelled motion of a rigid body inside a density dependent incompressible fluid | 2021-07-16 | Paper |
| Measure-valued solutions and weak-strong uniqueness for the incompressible inviscid fluid-rigid body interaction | 2021-06-01 | Paper |
| Stabilization of a rigid body moving in a compressible viscous fluid | 2021-04-27 | Paper |
| Existence of strong solutions for a system of interaction between a compressible viscous fluid and a wave equation | 2021-04-27 | Paper |
| Interpolation by Different Types of Quantum Channels Using Conic Programs | 2021-04-15 | Paper |
| Maximal-in-time existence and uniqueness of strong solution of a 3D fluid-structure interaction model | 2020-12-29 | Paper |
| Remark on the global null controllability for a viscous Burgers-particle system with particle supported control | 2020-06-09 | Paper |
| Shorter QA-NIZK and SPS with tighter security | 2020-05-11 | Paper |
| Forkcipher: a new primitive for authenticated encryption of very short messages | 2020-05-05 | Paper |
| Local null controllability of a rigid body moving into a Boussinesq flow | 2020-04-29 | Paper |
| Minicrypt primitives with algebraic structure and applications | 2020-02-06 | Paper |
| Constructing TI-friendly substitution boxes using shift-invariant permutations | 2020-01-28 | Paper |
| A brief comparison of SIMON and SIMECK | 2019-01-30 | Paper |
| Boundary feedback stabilization of the Boussinesq system with mixed boundary conditions | 2019-01-23 | Paper |
| Improved (almost) tightly-secure simulation-sound QA-NIZK with applications | 2018-12-20 | Paper |
| Smooth NIZK arguments | 2018-12-11 | Paper |
| Improved (almost) tightly-secure structure-preserving signatures | 2018-05-29 | Paper |
| Shorter quasi-adaptive NIZK proofs for linear subspaces | 2018-02-15 | Paper |
| Improved structure preserving signatures under standard bilinear assumptions | 2017-06-13 | Paper |
| MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity | 2017-02-01 | Paper |
| Dual-system simulation-soundness with applications to UC-PAKE and more | 2016-06-10 | Paper |
| Error-tolerant side-channel cube attack revisited | 2016-04-13 | Paper |
| Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More | 2015-12-10 | Paper |
| Cryptanalysis of the ``Kindle cipher | 2015-12-04 | Paper |
| Secure message authentication against related-key attack | 2015-09-18 | Paper |
| Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck} | 2015-09-18 | Paper |
| Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasures | 2015-07-21 | Paper |
| Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces | 2014-08-07 | Paper |
| Disintegrating supercritical jets in a subcritical environment | 2014-04-01 | Paper |
| Shorter quasi-adaptive NIZK proofs for linear subspaces | 2013-12-10 | Paper |
| Protocol composition logic (PCL) | 2013-12-06 | Paper |
| Relatively-Sound NIZKs and Password-Based Key-Exchange | 2012-07-20 | Paper |
| Boomerang Attacks on Hash Function Using Auxiliary Differentials | 2012-06-08 | Paper |
| Boomerang attacks on BLAKE-32 | 2011-07-07 | Paper |
| Inductive Proofs of Computational Secrecy | 2008-08-21 | Paper |
| On the effect of a large cloud of rigid particles on the motion of an incompressible non--Newtonian fluid | N/A | Paper |