| Publication | Date of Publication | Type |
|---|
On design and analysis of a new block cipher | 2024-06-21 | Paper |
Committed private information retrieval | 2024-06-05 | Paper |
Privacy-preserving authentication for tree-structured data with designated verification in outsourced environments | 2023-03-21 | Paper |
Parallel Private Retrieval of Merkle Proofs via Tree Colorings | 2022-05-10 | Paper |
A distributed networked system for secure publicly verifiable self-tallying online voting Information Sciences | 2021-11-30 | Paper |
Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments Information Processing Letters | 2021-10-19 | Paper |
Using blockchain to control access to cloud data | 2019-10-31 | Paper |
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller Journal of Discrete Algorithms | 2019-01-18 | Paper |
Fuzzy public-key encryption based on biometric data | 2018-11-07 | Paper |
Combinatorial algorithms and methods for security of statistical databases related to the work of Mirka Miller | 2018-06-15 | Paper |
Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption Journal of Computer and System Sciences | 2017-09-15 | Paper |
A new block cipher based on chaotic tent maps IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications | 2017-08-25 | Paper |
ID2S Password-Authenticated Key Exchange Protocols IEEE Transactions on Computers | 2017-05-16 | Paper |
CTM-sp: A Family of Cryptographic Hash Functions from Chaotic Tent Maps Information Security and Privacy | 2016-08-31 | Paper |
A graph isomorphism algorithm using signatures computed via quantum walk search model Journal of Physics A: Mathematical and Theoretical | 2015-04-14 | Paper |
Homomorphic encryption and applications SpringerBriefs in Computer Science | 2015-02-03 | Paper |
Certificateless message recovery signatures providing Girault's level-3 security Journal of Shanghai Jiaotong University (Science) | 2014-09-02 | Paper |
Private information retrieval Synthesis Lectures on Information Security, Privacy, and Trust | 2013-10-23 | Paper |
Efficient and Short Certificateless Signature Cryptology and Network Security | 2009-01-09 | Paper |
Directed Transitive Signature Scheme Lecture Notes in Computer Science | 2008-04-17 | Paper |
Authenticated key agreement in dynamic peer groups Theoretical Computer Science | 2005-01-11 | Paper |
scientific article; zbMATH DE number 2043341 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1808279 (Why is no real title available?) | 2002-09-26 | Paper |
scientific article; zbMATH DE number 1500485 (Why is no real title available?) | 2002-07-28 | Paper |
scientific article; zbMATH DE number 1700372 (Why is no real title available?) | 2002-02-10 | Paper |
scientific article; zbMATH DE number 1189369 (Why is no real title available?) | 1998-10-08 | Paper |