| Publication | Date of Publication | Type |
|---|
| Zero-knowledge protocols for the subset sum problem from MPC-in-the-head with rejection | 2023-08-16 | Paper |
| Dynamic random probing expansion with quasi linear asymptotic complexity | 2023-05-12 | Paper |
| Succinct Diophantine-satisfiability arguments | 2023-03-29 | Paper |
| Public-key generation with verifiable randomness | 2023-03-21 | Paper |
| Secure storage -- confidentiality and authentication | 2022-09-16 | Paper |
| Reusing nonces in Schnorr signatures (and keeping it secure...) | 2022-08-25 | Paper |
| The key-dependent message security of key-alternating Feistel ciphers | 2021-12-20 | Paper |
| Hardware security without secure hardware: how to decrypt with a password and a server | 2021-11-18 | Paper |
| Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND | 2021-03-30 | Paper |
| Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions | 2021-02-01 | Paper |
| Speeding-up verification of digital signatures | 2021-01-22 | Paper |
| Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures | 2020-06-24 | Paper |
| Inferring sequences produced by elliptic curve generators using Coppersmith's methods | 2020-05-26 | Paper |
| Lower and upper bounds on the randomness complexity of private computations of AND | 2020-04-30 | Paper |
| Analysis and improvement of an authentication scheme in incremental cryptography | 2019-02-20 | Paper |
| Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions | 2019-01-11 | Paper |
| Lattice attacks on pairing-based signatures | 2018-04-20 | Paper |
| Lattice attacks against elliptic-curve signatures with blinded scalar multiplication | 2018-02-16 | Paper |
| Practical key recovery for discrete-logarithm based authentication schemes from random nonce bits | 2018-02-14 | Paper |
| Private multiplication over finite fields | 2017-10-27 | Paper |
| Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption | 2017-07-27 | Paper |
| Polynomial interpolation of the Naor-Reingold pseudo-random function | 2017-07-19 | Paper |
| Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys | 2017-07-12 | Paper |
| Distribution and Polynomial Interpolation of the Dodis-Yampolskiy Pseudo-Random Function | 2017-06-13 | Paper |
| Full Disk Encryption: Bridging Theory and Practice | 2017-04-12 | Paper |
| Randomness Complexity of Private Circuits for Multiplication | 2016-07-15 | Paper |
| Comment on ``A strong provably secure IBE scheme without bilinear map by M. Zheng, Y. Xiang and H. Zhou | 2016-04-18 | Paper |
| Easing Coppersmith Methods Using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness | 2016-04-13 | Paper |
| Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions | 2016-04-08 | Paper |
| Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks | 2016-03-10 | Paper |
| Non-Interactive Zero-Knowledge Proofs of Non-Membership | 2016-03-02 | Paper |
| Analysis and Improvement of Lindell’s UC-Secure Commitment Schemes | 2014-01-24 | Paper |
| New Techniques for SPHFs and Efficient One-Round PAKE Protocols | 2013-09-02 | Paper |
| Time/Memory/Data Tradeoffs for Variants of the RSA Problem | 2013-06-11 | Paper |
| Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages | 2013-04-19 | Paper |
| Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions | 2013-04-04 | Paper |
| Enumeration formula for \((2,n)\)-cubes in discrete planes | 2012-10-26 | Paper |
| Compact Round-Optimal Partially-Blind Signatures | 2012-09-25 | Paper |
| Inferring Sequences Produced by Nonlinear Pseudorandom Number Generators Using Coppersmith’s Methods | 2012-07-20 | Paper |
| Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions | 2012-06-15 | Paper |
| Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes | 2011-12-16 | Paper |
| Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security | 2011-12-02 | Paper |
| Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform | 2011-06-29 | Paper |
| Signatures on Randomizable Ciphertexts | 2011-03-15 | Paper |
| Huff’s Model for Elliptic Curves | 2010-09-29 | Paper |
| Mediated Traceable Anonymous Encryption | 2010-08-31 | Paper |
| Time-selective convertible undeniable signatures with short conversion receipts | 2010-07-20 | Paper |
| On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption | 2010-07-06 | Paper |
| Batch Groth–Sahai | 2010-07-06 | Paper |
| Fair Blind Signatures without Random Oracles | 2010-05-04 | Paper |
| Multi-designated verifiers signatures: anonymity without encryption | 2010-01-29 | Paper |
| Provably Secure Code-Based Threshold Ring Signatures | 2010-01-07 | Paper |
| Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model | 2009-11-26 | Paper |
| Linear independence measure for squares of periods and quasi-periods of elliptic curves | 2009-05-28 | Paper |
| Adaptive-ID Secure Revocable Identity-Based Encryption | 2009-04-29 | Paper |
| NEW EXTENSIONS OF PAIRING-BASED SIGNATURES INTO UNIVERSAL (MULTI) DESIGNATED VERIFIER SIGNATURES | 2009-04-14 | Paper |
| Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys | 2009-03-24 | Paper |
| Gradually Convertible Undeniable Signatures | 2009-03-10 | Paper |
| Tracing Malicious Proxies in Proxy Re-encryption | 2009-02-10 | Paper |
| On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures | 2008-06-24 | Paper |
| Trapdoor Permutation Polynomials of ℤ/nℤ and Public Key Cryptosystems | 2008-06-24 | Paper |
| Separation Results on the “One-More” Computational Problems | 2008-04-24 | Paper |
| Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log | 2008-03-18 | Paper |
| Universally Convertible Directed Signatures | 2008-03-18 | Paper |
| Short Undeniable Signatures Without Random Oracles: The Missing Link | 2008-03-17 | Paper |
| Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption | 2008-03-05 | Paper |
| On Kabatianskii-Krouk-Smeets Signatures | 2007-11-15 | Paper |
| New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures | 2007-09-11 | Paper |
| Coding and Cryptography | 2007-05-02 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Universal forgery on Sekhar's signature scheme with message recovery | 2005-02-28 | Paper |