2025
Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification.
IACR Cryptol. ePrint Arch., 2025
2023
Quantum Complexity for Discrete Logarithms and Related Problems.
IACR Cryptol. ePrint Arch., 2023
Oracle Recording for Non-Uniform Random Oracles, and its Applications.
IACR Cryptol. ePrint Arch., 2023
Oracle Indistinguishability and Its Applications.
IEEE Access, 2023
2022
On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols.
Fundam. Informaticae, 2022
On Privacy Preserving Data Aggregation Protocols using BGN cryptosystem.
CoRR, 2022
2021
Formations for the Quantum Random Oracle.
IACR Cryptol. ePrint Arch., 2021
Secure Fully Homomorphic Authenticated Encryption.
IEEE Access, 2021
2019
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2019
2017
Quantum Security of NMAC and Related Constructions.
IACR Cryptol. ePrint Arch., 2017
Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2015
CRT-based fully homomorphic encryption over the integers.
Inf. Sci., 2015
2014
Generic Hardness of the Multiple Discrete Logarithm Problem.
IACR Cryptol. ePrint Arch., 2014
2013
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2013
Batch Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology, 2013
2012
A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
J. Cryptol., 2012
2011
On Lai-Massey and quasi-Feistel ciphers.
Des. Codes Cryptogr., 2011
2010
On Homomorphic Signatures for Network Coding.
IEEE Trans. Computers, 2010
Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010
2009
Anonymous Signatures Revisited.
IACR Cryptol. ePrint Arch., 2009
On protecting integrity and confidentiality of cryptographic file system for outsourced storage.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2007
Lai-Massey Scheme and Quasi-Feistel Networks.
IACR Cryptol. ePrint Arch., 2007
2006
Collision Search Attack for 53-Step HAS-160.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
Finding Collision on 45-Step HAS-160.
Proceedings of the Information Security and Cryptology, 2005
2004
Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004