2025
Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification.
IACR Cryptol. ePrint Arch., 2025

2023
Quantum Complexity for Discrete Logarithms and Related Problems.
IACR Cryptol. ePrint Arch., 2023

Oracle Recording for Non-Uniform Random Oracles, and its Applications.
IACR Cryptol. ePrint Arch., 2023

Oracle Indistinguishability and Its Applications.
IEEE Access, 2023

2022
On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols.
Fundam. Informaticae, 2022

On Privacy Preserving Data Aggregation Protocols using BGN cryptosystem.
CoRR, 2022

2021
Formations for the Quantum Random Oracle.
IACR Cryptol. ePrint Arch., 2021

Secure Fully Homomorphic Authenticated Encryption.
IEEE Access, 2021

2019
General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2019

2017
Quantum Security of NMAC and Related Constructions.
IACR Cryptol. ePrint Arch., 2017

Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2015
CRT-based fully homomorphic encryption over the integers.
Inf. Sci., 2015

2014
Generic Hardness of the Multiple Discrete Logarithm Problem.
IACR Cryptol. ePrint Arch., 2014

2013
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2013

Batch Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology, 2013

2012
A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
J. Cryptol., 2012

2011
On Lai-Massey and quasi-Feistel ciphers.
Des. Codes Cryptogr., 2011

2010
On Homomorphic Signatures for Network Coding.
IEEE Trans. Computers, 2010

Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
Anonymous Signatures Revisited.
IACR Cryptol. ePrint Arch., 2009

On protecting integrity and confidentiality of cryptographic file system for outsourced storage.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2007
Lai-Massey Scheme and Quasi-Feistel Networks.
IACR Cryptol. ePrint Arch., 2007

2006
Collision Search Attack for 53-Step HAS-160.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Finding Collision on 45-Step HAS-160.
Proceedings of the Information Security and Cryptology, 2005

2004
Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004