| Publication | Date of Publication | Type |
|---|
| Efficient secure storage with version control and key rotation | 2024-09-13 | Paper |
| Predicate aggregate signatures and applications | 2024-06-26 | Paper |
Retraction Note: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment Journal of Combinatorial Optimization | 2024-05-02 | Paper |
| Privacy-preserving decentralised singular value decomposition | 2024-04-19 | Paper |
Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting) Lecture Notes in Computer Science | 2023-11-16 | Paper |
Hierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds) Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy | 2023-04-13 | Paper |
| CCA updatable encryption against malicious re-encryption attacks | 2023-03-29 | Paper |
Retracted article: Cost-optimized data placement strategy for social network with security awareness in edge-cloud computing environment Journal of Combinatorial Optimization | 2022-12-01 | Paper |
Privacy-preserving and yet robust collaborative filtering recommender as a service Information Security and Cryptology | 2022-10-14 | Paper |
| Making \textit{any} attribute-based encryption accountable, efficiently | 2022-08-25 | Paper |
Making Any Identity-Based Encryption Accountable, Efficiently Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
| Witness authenticating NIZKs and applications | 2022-05-18 | Paper |
| Multi-input laconic function evaluation | 2021-06-08 | Paper |
Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited Proceedings of the 39th Symposium on Principles of Distributed Computing | 2021-03-15 | Paper |
A survey on true random number generators based on chaos Discrete Dynamics in Nature and Society | 2020-02-18 | Paper |
| Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog | 2020-01-28 | Paper |
| Graded signatures | 2018-10-18 | Paper |
| Key recovery attacks against NTRU-based somewhat homomorphic encryption schemes | 2018-10-18 | Paper |
| Distributed parameter generation for bilinear Diffie Hellman exponentiation and applications | 2018-10-18 | Paper |
| Correcting subverted random oracles | 2018-09-26 | Paper |
| Making public key functional encryption function private, distributively | 2018-05-29 | Paper |
| Updatable functional encryption | 2017-10-23 | Paper |
A Homotopy Method for Locating All the Poles of a Parallel Plate Waveguide With the PML IEEE Transactions on Antennas and Propagation | 2017-09-20 | Paper |
Cliptography: clipping the power of kleptographic attacks Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Honey Encryption Beyond Message Recovery Security Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Communication optimal Tardos-based asymmetric fingerprinting Lecture Notes in Computer Science | 2016-03-02 | Paper |
Towards forward security properties for PEKS and IBE Information Security and Privacy | 2015-10-20 | Paper |
On key recovery attacks against existing somewhat homomorphic encryption schemes Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings Theoretical Computer Science | 2014-12-02 | Paper |
New algorithms for secure outsourcing of modular exponentiations Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Extended KCI attack against two-party key establishment protocols Information Processing Letters | 2013-04-04 | Paper |
Public key encryption schemes supporting equality test with authorisation of different granularity International Journal of Applied Cryptography | 2012-11-16 | Paper |
Towards a security model for computational puzzle schemes International Journal of Computer Mathematics | 2011-11-29 | Paper |
Kalwen+: practical key management schemes for gossip-based wireless medical sensor networks Information Security and Cryptology | 2011-07-29 | Paper |
| scientific article; zbMATH DE number 5926874 (Why is no real title available?) | 2011-07-19 | Paper |
Towards public key encryption scheme supporting equality test with fine-grained authorization Information Security and Privacy | 2011-07-07 | Paper |
COMPARISON OF DIFFERENT DAILY STREAMFLOW SERIES IN US AND CHINA, UNDER A VIEWPOINT OF COMPLEX NETWORKS Modern Physics Letters B | 2010-09-23 | Paper |
TF/TA<sup>2</sup> trajectory tracking using nonlinear predictive control approach Journal of Systems Engineering and Electronics | 2009-11-06 | Paper |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security Lecture Notes in Computer Science | 2009-09-29 | Paper |
Inter-domain Identity-Based Proxy Re-encryption Information Security and Cryptology | 2009-04-29 | Paper |
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication Information Security and Privacy | 2009-03-06 | Paper |
Type-Based Proxy Re-encryption and Its Construction Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
SCALING BEHAVIOR OF DIFFUSION LIMITED AGGREGATION IN PERCOLATION CLUSTER Modern Physics Letters B | 2008-11-03 | Paper |
| Bilateral unknown key-share attacks in key agreement protocols | 2008-08-07 | Paper |
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability Lecture Notes in Computer Science | 2008-06-24 | Paper |
Extended Private Information Retrieval and Its Application in Biometrics Authentications Cryptology and Network Security | 2008-04-15 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |