| Publication | Date of Publication | Type |
|---|
| Rejection-free framework of zero-knowledge proof based on \textsf{Hint-MLWE} | 2026-03-23 | Paper |
Lattice signature with efficient protocols, application to anonymous credentials Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
| Identity-based encryption from lattices using approximate trapdoors | 2024-01-11 | Paper |
A generic transform from multi-round interactive proof to NIZK Lecture Notes in Computer Science | 2023-11-16 | Paper |
Log-\(\mathcal{S}\)-unit lattices using explicit Stickelberger generators to solve approx ideal-SVP Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Entropic hardness of Module-LWE from module-NTRU Lecture Notes in Computer Science | 2023-08-14 | Paper |
| Towards classical hardness of module-LWE: the linear rank case | 2023-03-21 | Paper |
| Constant-size lattice-based group signature with forward security in the standard model | 2023-03-21 | Paper |
| Twisted-PHS: using the product formula to solve approx-SVP in ideal lattices | 2023-03-21 | Paper |
On the hardness of module learning with errors with short distributions Journal of Cryptology | 2023-01-05 | Paper |
| Post-quantum online voting scheme | 2022-06-01 | Paper |
| Implementation of lattice trapdoors on modules and applications | 2022-03-22 | Paper |
| On the hardness of module-LWE with binary secret | 2021-12-20 | Paper |
| Middle-product learning with rounding problem and its applications | 2020-05-20 | Paper |
| From identification using rejection sampling to signatures via the Fiat-Shamir transform: application to the BLISS signature | 2018-10-24 | Paper |
| Practical implementation of Ring-SIS/LWE based signature and IBE | 2018-06-22 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Journal of Cryptology | 2018-05-28 | Paper |
A lattice-based group signature scheme with verifier-local revocation Theoretical Computer Science | 2018-05-17 | Paper |
Somewhat/fully homomorphic encryption: implementation progresses and challenges Codes, Cryptology and Information Security | 2017-06-01 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Implementing candidate graded encoding schemes from ideal lattices Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Worst-case to average-case reductions for module lattices Designs, Codes and Cryptography | 2015-05-21 | Paper |
Classical hardness of learning with errors Proceedings of the forty-eighth annual ACM symposium on Theory of Computing | 2014-08-07 | Paper |
GGHLite: more efficient multilinear maps from ideal lattices Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Lattice-based group signature scheme with verifier-local revocation Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Lattice-based group signatures with logarithmic signature size Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |