| Publication | Date of Publication | Type |
|---|
| Circuit bootstrapping: faster and smaller | 2024-11-12 | Paper |
| Improved homomorphic evaluation for hash function based on TFHE | 2024-07-19 | Paper |
| Power of randomness recovery: tighter CCA-secure KEM in the QROM | 2024-07-19 | Paper |
| Full domain functional bootstrapping with least significant bit encoding | 2024-07-17 | Paper |
| Revisiting key switching techniques with applications to light-key FHE | 2024-05-31 | Paper |
| IND-CCA security of Kyber in the quantum random oracle model, revisited | 2023-08-21 | Paper |
| Implicit rejection in Fujisaki-Okamoto: framework and a novel realization | 2023-08-04 | Paper |
| Hybrid dual and meet-LWE attack | 2023-07-26 | Paper |
| Attacking ECDSA leaking discrete bits with a more efficient lattice | 2022-07-01 | Paper |
| Predicting the concrete security of LWE against the dual attack using binary search | 2022-06-08 | Paper |
| Towards tightly secure deterministic public key encryption | 2020-07-20 | Paper |
| Compact (targeted homomorphic) inner product encryption from LWE | 2020-07-20 | Paper |
| Preprocess-then-NTT Technique and its applications to Kyber and NewHope | 2019-10-31 | Paper |
| Understanding and constructing AKE via double-key key encapsulation mechanism | 2019-01-23 | Paper |
| Cramer-Shoup like chosen ciphertext security from LPN | 2018-12-07 | Paper |
| Identity-based lossy encryption from learning with errors | 2018-10-24 | Paper |
| Improved efficiency of MP12 | 2018-10-24 | Paper |
| IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper) | 2018-10-24 | Paper |
| Lattice-based dual receiver encryption and more | 2018-09-26 | Paper |
| Dual-mode cryptosystem based on the learning with errors problem | 2017-08-25 | Paper |
| Lossy key encapsulation mechanism and its applications | 2017-05-19 | Paper |
| Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation | 2017-05-05 | Paper |
| Constructions secure against receiver selective opening and chosen ciphertext attacks | 2017-04-12 | Paper |
| Receiver Selective Opening Security from Indistinguishability Obfuscation | 2016-12-21 | Paper |
| Approximate-deterministic public key encryption from hard learning problems | 2016-12-21 | Paper |
| CCA secure public key encryption scheme based on LWE without Gaussian sampling | 2016-07-25 | Paper |
| Lossy Projective Hashing and Its Applications | 2016-01-12 | Paper |
| RSA-OAEP is RKA secure | 2015-12-02 | Paper |
| Related-key security for hybrid encryption | 2015-11-03 | Paper |
| KDM-CCA Security from RKA Secure Authenticated Encryption | 2015-09-30 | Paper |
| Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation | 2015-09-29 | Paper |
| Related key secure PKE from hash proof systems | 2015-05-27 | Paper |
| On the lossiness of \(2^k\)-th power and the instantiability of Rabin-OAEP | 2015-02-10 | Paper |
| RKA secure PKE based on the DDH and HR assumptions | 2013-10-23 | Paper |
| How to Remove the Exponent GCD in HK09 | 2013-10-23 | Paper |
| Improved tradeoff between encapsulation and decapsulation of HK09 | 2013-01-07 | Paper |
| Improved efficiency of chosen ciphertext secure encryption from factoring | 2012-06-29 | Paper |
| Key-dependent message security for division function: discouraging anonymous credential sharing | 2011-09-16 | Paper |
| Efficient CCA-secure CDH based KEM balanced between ciphertext and key | 2011-07-07 | Paper |
| Encryption Simulatability Reconsidered | 2011-05-19 | Paper |
| Chosen ciphertext secure encryption under factoring assumption revisited | 2011-03-15 | Paper |
| Improved efficiency of Kiltz07-KEM | 2010-08-20 | Paper |
| Authenticated group key agreement protocol with resistance to leakage of ephemeral secret DH exponents | 2009-03-06 | Paper |