| Publication | Date of Publication | Type |
|---|
Circuit bootstrapping: faster and smaller | 2024-11-12 | Paper |
Improved homomorphic evaluation for hash function based on TFHE | 2024-07-19 | Paper |
Power of randomness recovery: tighter CCA-secure KEM in the QROM | 2024-07-19 | Paper |
Full domain functional bootstrapping with least significant bit encoding | 2024-07-17 | Paper |
Revisiting key switching techniques with applications to light-key FHE | 2024-05-31 | Paper |
IND-CCA security of Kyber in the quantum random oracle model, revisited Information Security and Cryptology | 2023-08-21 | Paper |
Implicit rejection in Fujisaki-Okamoto: framework and a novel realization Lecture Notes in Computer Science | 2023-08-04 | Paper |
Hybrid dual and meet-LWE attack Information Security and Privacy | 2023-07-26 | Paper |
Attacking ECDSA leaking discrete bits with a more efficient lattice | 2022-07-01 | Paper |
Predicting the concrete security of LWE against the dual attack using binary search | 2022-06-08 | Paper |
Towards tightly secure deterministic public key encryption Information and Communications Security | 2020-07-20 | Paper |
Compact (targeted homomorphic) inner product encryption from LWE Information and Communications Security | 2020-07-20 | Paper |
Preprocess-then-NTT Technique and its applications to Kyber and NewHope | 2019-10-31 | Paper |
Understanding and constructing AKE via double-key key encapsulation mechanism | 2019-01-23 | Paper |
Cramer-Shoup like chosen ciphertext security from LPN | 2018-12-07 | Paper |
Identity-based lossy encryption from learning with errors | 2018-10-24 | Paper |
Improved efficiency of MP12 | 2018-10-24 | Paper |
IND-PCA secure KEM is enough for password-based authenticated key exchange (short paper) | 2018-10-24 | Paper |
Lattice-based dual receiver encryption and more | 2018-09-26 | Paper |
Dual-mode cryptosystem based on the learning with errors problem | 2017-08-25 | Paper |
Lossy key encapsulation mechanism and its applications Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation Information Security and Cryptology | 2017-05-05 | Paper |
Constructions secure against receiver selective opening and chosen ciphertext attacks Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Receiver Selective Opening Security from Indistinguishability Obfuscation Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Approximate-deterministic public key encryption from hard learning problems Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
CCA secure public key encryption scheme based on LWE without Gaussian sampling Information Security and Cryptology | 2016-07-25 | Paper |
Lossy Projective Hashing and Its Applications Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
RSA-OAEP is RKA secure Information Security and Cryptology | 2015-12-02 | Paper |
Related-key security for hybrid encryption Lecture Notes in Computer Science | 2015-11-03 | Paper |
KDM-CCA Security from RKA Secure Authenticated Encryption Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation Provable Security | 2015-09-29 | Paper |
Related key secure PKE from hash proof systems Advances in Information and Computer Security | 2015-05-27 | Paper |
On the lossiness of \(2^k\)-th power and the instantiability of Rabin-OAEP Cryptology and Network Security | 2015-02-10 | Paper |
RKA secure PKE based on the DDH and HR assumptions Provable Security | 2013-10-23 | Paper |
How to Remove the Exponent GCD in HK09 Provable Security | 2013-10-23 | Paper |
Improved tradeoff between encapsulation and decapsulation of HK09 Information Security and Cryptology | 2013-01-07 | Paper |
Improved efficiency of chosen ciphertext secure encryption from factoring Information Security Practice and Experience | 2012-06-29 | Paper |
Key-dependent message security for division function: discouraging anonymous credential sharing Provable Security | 2011-09-16 | Paper |
Efficient CCA-secure CDH based KEM balanced between ciphertext and key Information Security and Privacy | 2011-07-07 | Paper |
Encryption Simulatability Reconsidered Information Security Practice and Experience | 2011-05-19 | Paper |
Chosen ciphertext secure encryption under factoring assumption revisited Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Improved efficiency of Kiltz07-KEM Information Processing Letters | 2010-08-20 | Paper |
Authenticated group key agreement protocol with resistance to leakage of ephemeral secret DH exponents | 2009-03-06 | Paper |