Publications

For a complete list, visit my Google Scholar

(2020). Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT. Accepted at the 23rd Information Security Conference (ISC 2020), to appear. Springer, Cham.

PDF

(2020). MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves. 10th ACM Conference on Data and Application Security and Privacy (CODASPY 2020), (pp. 17-28). ACM.

PDF

(2019). Energy-Aware Digital Signatures for Embedded Medical Devices. 17th IEEE Conference on Communications and Network Security (CNS 2019), (pp. 55-63). IEEE.

PDF Code

(2019). ARIS: Authentication for Real-Time IoT Systems. 53rd IEEE International Conference on Communications (ICC 2019), (pp. 1-6). IEEE.

PDF Code

(2019). Fast Authentication from Aggregate Signatures with Improved Security. 23rd International Conference on Financial Cryptography and Data Security (FC 2019), (pp. 686-705). Springer, Cham.

PDF Code

(2018). Lattice-Based Public Key Searchable Encryption from Experimental Perspectives. To appear in IEEE Transactions on Dependable and Secure Computing (TDSC). IEEE.

PDF Code

(2018). TACHYON: Fast Signatures from Compact Knapsack. 26th ACM SIGSAC Conference on Computer and Communications Security (CCS 2018), (pp. 1855-1867). ACM.

PDF Code

(2018). Compact Energy and Delay-Aware Authentication. 16th IEEE Conference on Communications and Network Security (CNS 2018), (pp. 1-9). IEEE. Equally contributing first and second authors.

PDF Code

(2017). High-Speed High-Security Public Key Encryption with Keyword Search. 31st IFIP Annual Conference on Data and Applications Security and Privacy XXXI (DBSec 2017) , (pp. 365-385). Springer, Cham.

PDF Code

(2016). Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. Paradigms in Cryptology – Malicious and Exploratory Cryptology (Mycrypt 2016), (pp. 474–477). Springer, Cham.

PDF

(2016). The insecurity of a certificateless undeniable signature scheme. 12th International Wireless Communications and Mobile Computing Conference (IWCMC 2016), (pp. 582-587). IEEE.

PDF

(2015). An Efficient Certificateless Undeniable Signature Scheme. International Journal of Computer Mathematics, 92(7), (pp.1313-1328).

PDF

(2015). Cryptanalysis of a Certificateless Identification Scheme. Security and Communication Networks 8(2), (pp. 122-125).

PDF

(2015). A Provable Secure Pairing-Free Certificateless Identification Scheme. International Journal of Computer Mathematics, 92(8), (pp.1313-1328).

PDF

(2013). An Efficient and Provably Secure Certificateless Identification Scheme. In the 17th International Conference on Security and Cryptography (SECRYPT 2013), (pp. 1-8). IEEE.

PDF