| Publication | Date of Publication | Type |
|---|
Loquat: a SNARK-friendly post-quantum signature based on the Legendre PRF with applications in ring and aggregate signatures | 2024-12-04 | Paper |
\textsf{Plover}: masking-friendly hash-and-sign lattice signatures | 2024-11-13 | Paper |
An injectivity analysis of Crystals-Kyber and implications on quantum security Information Security and Privacy | 2023-07-26 | Paper |
Incremental symmetric puncturable encryption with support for unbounded number of punctures Designs, Codes and Cryptography | 2023-04-12 | Paper |
A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties Information Security Practice and Experience | 2022-12-09 | Paper |
Post-quantum ID-based ring signatures from symmetric-key primitives | 2022-11-09 | Paper |
Revocable and linkable ring signature Information Security and Cryptology | 2022-10-14 | Paper |
COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers Post-Quantum Cryptography | 2022-10-13 | Paper |
Public-key puncturable encryption: modular and compact constructions Lecture Notes in Computer Science | 2022-10-13 | Paper |
DGM: a \underline{D}ynamic and revocable \underline{G}roup \underline{M}erkle signature | 2022-08-25 | Paper |
Generic multi-keyword ranked search on encrypted cloud data | 2022-08-25 | Paper |
An efficient non-interactive multi-client searchable encryption with support for Boolean queries | 2022-08-19 | Paper |
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems Designs, Codes and Cryptography | 2022-08-04 | Paper |
Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications Public-Key Cryptography – PKC 2022 | 2022-07-08 | Paper |
FPPW: a fair and privacy preserving watchtower for bitcoin | 2022-06-22 | Paper |
Practical post-quantum few-time verifiable random function with applications to Algorand | 2022-06-22 | Paper |
Efficient lattice-based polynomial evaluation and batch ZK arguments | 2022-03-25 | Paper |
On the integer polynomial learning with errors problem | 2021-12-21 | Paper |
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security | 2021-12-01 | Paper |
MPSign: a signature from small-secret middle-product learning with errors | 2021-12-01 | Paper |
Lattice-based zero-knowledge arguments for additive and multiplicative relations Designs, Codes and Cryptography | 2021-05-10 | Paper |
Senarai: a sustainable public blockchain-based permanent storage protocol Cryptology and Network Security | 2020-07-20 | Paper |
Lattice RingCT v2.0 with multiple input and multiple output wallets | 2020-05-27 | Paper |
Risk of asynchronous protocol update: attacks to Monero protocols | 2020-05-27 | Paper |
Lattice-based zero-knowledge proofs: new techniques for shorter and faster constructions and applications | 2020-05-20 | Paper |
Short lattice-based one-out-of-many proofs and applications to ring signatures | 2020-01-30 | Paper |
FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers IEEE Transactions on Computers | 2020-01-28 | Paper |
Practical \(\mathsf{MP} \text{- }\mathsf{LWE}\)-based encryption balancing security-risk versus efficiency Designs, Codes and Cryptography | 2019-11-07 | Paper |
Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice ringct v1.0) | 2018-09-26 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Journal of Cryptology | 2018-05-28 | Paper |
Hardness of \(k\)-LWE and applications in traitor tracing Algorithmica | 2018-01-05 | Paper |
All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE | 2017-10-27 | Paper |
Middle-product Learning with Errors | 2017-10-27 | Paper |
Multi-user cloud-based secure keyword search | 2017-08-25 | Paper |
Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Rotational cryptanalysis of ARX revisited Fast Software Encryption | 2015-09-18 | Paper |
A subexponential construction of graph coloring for multiparty computation Journal of Mathematical Cryptology | 2015-01-22 | Paper |
Hardness of \(k\)-LWE and applications in traitor tracing Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Practical attack on NLM-MAC scheme Information Processing Letters | 2014-06-23 | Paper |
GGHLite: more efficient multilinear maps from ideal lattices Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Lattice-based completely non-malleable public-key encryption in the standard model Designs, Codes and Cryptography | 2014-04-29 | Paper |
Security analysis of linearly filtered NLFSRs Journal of Mathematical Cryptology | 2014-01-23 | Paper |
Cryptanalysis of WG-7: a lightweight stream cipher Cryptography and Communications | 2013-06-24 | Paper |
Graph coloring applied to secure computation in non-abelian groups Journal of Cryptology | 2013-01-04 | Paper |
Active security in multiparty computation over black-box groups Lecture Notes in Computer Science | 2012-09-25 | Paper |
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
On the modular inversion hidden number problem Journal of Symbolic Computation | 2012-05-04 | Paper |
Multi-party computation with conversion of secret sharing Designs, Codes and Cryptography | 2012-03-01 | Paper |
Known and Chosen Key Differential Distinguishers for Block Ciphers Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster) Information Security and Privacy | 2011-07-07 | Paper |
Making NTRU as secure as worst-case problems over ideal lattices Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Security for Signcryption: The Multi-User Model Practical Signcryption | 2011-05-18 | Paper |
Faster fully homomorphic encryption Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Universal designated-verifier signatures Lecture Notes in Computer Science | 2010-01-05 | Paper |
Efficient public key encryption based on ideal lattices (extended abstract) Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
On Secure Multi-party Computation in Black-Box Groups Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Collision in the DSA Function Coding and Cryptology | 2009-03-09 | Paper |
A Critical Look at Cryptographic Hash Function Literature Coding and Cryptology | 2009-03-09 | Paper |
The Current Status in Design of Efficient Provably Secure Cryptographic Pseudorandom Generators Coding and Cryptology | 2009-03-09 | Paper |
Lattice-based treshold-changeability for standard CRT secret-sharing schemes Finite Fields and their Applications | 2009-02-09 | Paper |
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits Cryptology and Network Security | 2009-01-09 | Paper |
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Cryptanalysis of LASH Fast Software Encryption | 2008-09-18 | Paper |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders Lecture Notes in Computer Science | 2008-06-17 | Paper |
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature Lecture Notes in Computer Science | 2008-04-17 | Paper |
VSH, an Efficient and Provable Collision-Resistant Hash Function Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Formal proofs for the security of signcryption Journal of Cryptology | 2007-05-03 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
New constructions of anonymous membership broadcasting schemes Advances in Mathematics of Communications | 2007-04-05 | Paper |
Chinese remaindering with multiplicative noise Theory of Computing Systems | 2007-02-14 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes | 2005-08-12 | Paper |
On the security of RSA with primes sharing least-significant bits Applicable Algebra in Engineering, Communication and Computing | 2005-02-09 | Paper |
scientific article; zbMATH DE number 2086897 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2085423 (Why is no real title available?) | 2004-08-09 | Paper |
Noisy Chinese remaindering in the Lee norm Journal of Complexity | 2004-08-06 | Paper |
scientific article; zbMATH DE number 2080187 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 1950347 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1617917 (Why is no real title available?) | 2002-11-04 | Paper |
scientific article; zbMATH DE number 1759660 (Why is no real title available?) | 2002-10-10 | Paper |