Publication Venue For An efficient perturbation approach for multivariate data in sensitive and reliable data mining 2021 A generalised bound for the Wiener attack on RSA 2020 A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system 2019 Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves 2018 Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks 2018 Sequence Aware Functional Encryption and Its Application in Searchable Encryption 2017 One-sided leakage-resilient privacy only two-message oblivious transfer 2014
Publication Venue For An efficient perturbation approach for multivariate data in sensitive and reliable data mining 2021 A generalised bound for the Wiener attack on RSA 2020 A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system 2019 Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves 2018 Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks 2018 Sequence Aware Functional Encryption and Its Application in Searchable Encryption 2017 One-sided leakage-resilient privacy only two-message oblivious transfer 2014