| Publication | Date of Publication | Type |
|---|
Comment on: ``An efficient identity-based signature scheme with provable security Information Sciences | 2024-02-16 | Paper |
A Generic Framework for Accountable Optimistic Fair Exchange Protocol Information Security Practice and Experience | 2023-06-30 | Paper |
A generic framework for accountable optimistic fair exchange protocol Symmetry | 2019-07-10 | Paper |
| Cryptanalysis of an identity-based convertible undeniable signature scheme | 2017-10-23 | Paper |
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map Nonlinear Dynamics | 2016-12-16 | Paper |
Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme Cryptography and Communications | 2016-07-01 | Paper |
An efficient certificateless undeniable signature scheme International Journal of Computer Mathematics | 2015-07-30 | Paper |
A provable secure pairing-free certificateless identification scheme International Journal of Computer Mathematics | 2015-07-30 | Paper |
Differential attack on nine rounds of the SEED block cipher Information Processing Letters | 2014-04-14 | Paper |
On the security of a modified Beth identity-based identification scheme Information Processing Letters | 2014-04-11 | Paper |
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester International Journal of Computer Mathematics | 2014-01-29 | Paper |
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09 Cryptology and Network Security | 2012-07-20 | Paper |
Hierarchical Identity-Based Identification Schemes Security Technology | 2010-04-23 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Security Mediated Certificateless Signatures Applied Cryptography and Network Security | 2009-03-10 | Paper |
New Constructions of Universal Hash Functions Based on Function Sums Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
The power of identification schemes International Journal of Applied Cryptography | 2009-01-15 | Paper |
The security of the FDH variant of Chaum's undeniable signature scheme IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Relations Among Security Notions for Undeniable Signature Schemes Lecture Notes in Computer Science | 2008-11-27 | Paper |
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model Public Key Infrastructure | 2008-06-12 | Paper |
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication Provable Security | 2008-06-10 | Paper |
3-Move Undeniable Signature Scheme Lecture Notes in Computer Science | 2008-05-06 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
| scientific article; zbMATH DE number 2043349 (Why is no real title available?) | 2004-02-16 | Paper |