| Publication | Date of Publication | Type |
|---|
| Circuit bootstrapping: faster and smaller | 2024-11-12 | Paper |
| Improved homomorphic evaluation for hash function based on TFHE | 2024-07-19 | Paper |
| Power of randomness recovery: tighter CCA-secure KEM in the QROM | 2024-07-19 | Paper |
| Full domain functional bootstrapping with least significant bit encoding | 2024-07-17 | Paper |
| Revisiting key switching techniques with applications to light-key FHE | 2024-05-31 | Paper |
| IND-CCA security of Kyber in the quantum random oracle model, revisited | 2023-08-21 | Paper |
| Implicit rejection in Fujisaki-Okamoto: framework and a novel realization | 2023-08-04 | Paper |
| Hybrid dual and meet-LWE attack | 2023-07-26 | Paper |
| Attacking ECDSA leaking discrete bits with a more efficient lattice | 2022-07-01 | Paper |
| Predicting the concrete security of LWE against the dual attack using binary search | 2022-06-08 | Paper |
| Towards Tightly Secure Deterministic Public Key Encryption | 2020-07-20 | Paper |
| Compact (Targeted Homomorphic) Inner Product Encryption from LWE | 2020-07-20 | Paper |
| Preprocess-then-NTT Technique and its applications to Kyber and NewHope | 2019-10-31 | Paper |
| Understanding and constructing AKE via double-key key encapsulation mechanism | 2019-01-23 | Paper |
| Cramer-Shoup like chosen ciphertext security from LPN | 2018-12-07 | Paper |
| Identity-based lossy encryption from learning with errors | 2018-10-24 | Paper |
| Improved efficiency of MP12 | 2018-10-24 | Paper |
| IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper) | 2018-10-24 | Paper |
| Lattice-based dual receiver encryption and more | 2018-09-26 | Paper |
| Dual-mode cryptosystem based on the learning with errors problem | 2017-08-25 | Paper |
| Lossy Key Encapsulation Mechanism and Its Applications | 2017-05-19 | Paper |
| Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation | 2017-05-05 | Paper |
| Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks | 2017-04-12 | Paper |
| Receiver Selective Opening Security from Indistinguishability Obfuscation | 2016-12-21 | Paper |
| Approximate-Deterministic Public Key Encryption from Hard Learning Problems | 2016-12-21 | Paper |
| CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling | 2016-07-25 | Paper |
| Lossy Projective Hashing and Its Applications | 2016-01-12 | Paper |
| RSA-OAEP is RKA Secure | 2015-12-02 | Paper |
| Related-Key Security for Hybrid Encryption | 2015-11-03 | Paper |
| KDM-CCA Security from RKA Secure Authenticated Encryption | 2015-09-30 | Paper |
| Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation | 2015-09-29 | Paper |
| Related Key Secure PKE from Hash Proof Systems | 2015-05-27 | Paper |
| On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP | 2015-02-10 | Paper |
| RKA Secure PKE Based on the DDH and HR Assumptions | 2013-10-23 | Paper |
| How to Remove the Exponent GCD in HK09 | 2013-10-23 | Paper |
| Improved Tradeoff between Encapsulation and Decapsulation of HK09 | 2013-01-07 | Paper |
| Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring | 2012-06-29 | Paper |
| Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing | 2011-09-16 | Paper |
| Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key | 2011-07-07 | Paper |
| Encryption Simulatability Reconsidered | 2011-05-19 | Paper |
| Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited | 2011-03-15 | Paper |
| Improved efficiency of Kiltz07-KEM | 2010-08-20 | Paper |
| Authenticated group key agreement protocol with resistance to leakage of ephemeral secret DH exponents | 2009-03-06 | Paper |