Publication Venue For Strongly leakage resilient authenticated key exchange, revisited 2020 A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system 2018 Functional encryption for computational hiding in prime order groups via pair encodings 2018 A note on the strong authenticated key exchange with auxiliary inputs 2017 Strong authenticated key exchange with auxiliary inputs 2017 LLL for ideal lattices re-evaluation of the security of Gentry-Halevi's FHE scheme 2015 Construction of deletion correting codes using generalized Reed-Solomon codes and their subcodes 2007 A New Method for Constructing Williamson Matrices 2005 Values of minors of (1,-1) incidence matrices of SBIBDs and their application to the growth problem 2001
Publication Venue For Strongly leakage resilient authenticated key exchange, revisited 2020 A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system 2018 Functional encryption for computational hiding in prime order groups via pair encodings 2018 A note on the strong authenticated key exchange with auxiliary inputs 2017 Strong authenticated key exchange with auxiliary inputs 2017 LLL for ideal lattices re-evaluation of the security of Gentry-Halevi's FHE scheme 2015 Construction of deletion correting codes using generalized Reed-Solomon codes and their subcodes 2007 A New Method for Constructing Williamson Matrices 2005 Values of minors of (1,-1) incidence matrices of SBIBDs and their application to the growth problem 2001