| Publication | Date of Publication | Type |
|---|
An efficient ZK compiler from SIMD circuits to general circuits Journal of Cryptology | 2024-12-27 | Paper |
The hardness of LPN over any integer ring and field for PCG applications | 2024-11-13 | Paper |
\textsf{ReSolveD}: shorter signatures from regular syndrome decoding and VOLE-in-the-head | 2024-11-12 | Paper |
Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III} | 2024-08-30 | Paper |
Security proofs for key-alternating ciphers with non-independent round permutations | 2024-08-01 | Paper |
Embedding best-worst method into data envelopment analysis Asia-Pacific Journal of Operational Research | 2024-06-25 | Paper |
Revisiting the constant-sum Winternitz one-time signature with applications to SPHINCS\textsuperscript{+} and XMSS Advances in Cryptology – CRYPTO 2023 | 2024-02-06 | Paper |
Actively secure half-gates with minimum overhead under duplex networks Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
A non-heuristic approach to time-space tradeoffs and optimizations for BKW Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Packed multiplication: how to amortize the cost of side-channel masking? | 2023-03-21 | Paper |
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key 1511.9413 | 2022-12-22 | Paper |
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation | 2022-12-09 | Paper |
Cryptanalysis of candidate obfuscators for affine determinant programs | 2022-08-30 | Paper |
The stability of a dynamic duopoly Cournot-Bertrand game model Journal of Computational and Applied Mathematics | 2022-06-16 | Paper |
Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact | 2022-04-22 | Paper |
Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN | 2022-04-22 | Paper |
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes | 2021-12-01 | Paper |
An improved algorithm for learning sparse parities in the presence of noise Theoretical Computer Science | 2021-06-22 | Paper |
The stability and duality of dynamic Cournot and Bertrand duopoly model with comprehensive preference Applied Mathematics and Computation | 2021-04-20 | Paper |
The stability of Bayesian Nash equilibrium of dynamic Cournot duopoly model with asymmetric information Communications in Nonlinear Science and Numerical Simulation | 2020-10-23 | Paper |
Complex dynamical behaviors of a mixed duopoly game based on intellectual property rights protection Complexity | 2020-10-21 | Paper |
The dynamic rent-seeking games with policymaker cost and competition intensity Discrete Dynamics in Nature and Society | 2020-10-14 | Paper |
Valiant's universal circuits revisited: an overall improvement and a lower bound | 2020-05-20 | Paper |
Collision resistant hashing from sub-exponential learning parity with noise | 2020-05-05 | Paper |
Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
Robust sampled-data observer design for Lipschitz nonlinear systems. Kybernetika | 2018-11-29 | Paper |
Secure outsourcing of cryptographic circuits | 2018-11-07 | Paper |
On the hardness of sparsely learning parity with noise | 2018-11-07 | Paper |
On the robustness of learning parity with noise | 2018-10-26 | Paper |
Data envelopment analysis cross-like efficiency model for non-homogeneous decision-making units: the case of United States companies' low-carbon investment to attain corporate sustainability European Journal of Operational Research | 2018-04-23 | Paper |
Two-round PAKE from approximate SPH and instantiations from lattices | 2018-02-23 | Paper |
Evaluation and improvement of generic-emulating DPA attacks | 2018-02-14 | Paper |
Public key encryption resilient to leakage and tampering attacks Journal of Computer and System Sciences | 2017-09-07 | Paper |
Ridge-based profiled differential power analysis Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Solving stochastic ship fleet routing problems with inventory management using branch and price Advances in Stochastic and Deterministic Global Optimization | 2017-02-03 | Paper |
scientific article; zbMATH DE number 6672572 (Why is no real title available?) | 2017-01-06 | Paper |
Cryptography with auxiliary input and trapdoor from constant-noise LPN Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Efficient completely non-malleable and RKA secure public key encryptions Information Security and Privacy | 2016-09-02 | Paper |
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations Information Security and Privacy | 2016-08-31 | Paper |
Pseudorandom functions in almost constant depth from low-noise LPN Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond Lecture Notes in Computer Science | 2015-12-10 | Paper |
The randomized iterate, revisited -- almost linear seed length PRGs from a broader class of one-way functions Theory of Cryptography | 2015-07-06 | Paper |
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model Mathematical and Computer Modelling | 2015-02-19 | Paper |
Pseudorandom generators from regular one-way functions: new constructions with improved parameters Theoretical Computer Science | 2015-01-28 | Paper |
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model Information and Communications Security | 2014-09-29 | Paper |
Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree Journal of Mathematical Analysis and Applications | 2014-01-28 | Paper |
Constructing practical signcryption KEM from standard assumptions without random oracles Applied Cryptography and Network Security | 2014-01-24 | Paper |
Pseudorandom generators from regular one-way functions: new constructions with improved parameters Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Leakage-resilient symmetric cryptography under empirically verifiable assumptions Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Overcoming weak expectations Theory of Cryptography | 2013-03-18 | Paper |
Practical leakage-resilient pseudorandom objects with minimum public randomness Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Leftover Hash Lemma, Revisited Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
scientific article; zbMATH DE number 5722935 (Why is no real title available?) | 2010-06-17 | Paper |
scientific article; zbMATH DE number 5671085 (Why is no real title available?) | 2010-02-12 | Paper |
Ringel-Hall algebra of \(A^\infty_\infty\)-type | 2009-11-11 | Paper |
Hiding Circuit Topology from Unbounded Reverse Engineers Information Security and Privacy | 2007-09-07 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |