publications
recent publications in reversed chronological order
2024
-
Fast Secure Computations on Shared Polynomials and Applications to Private Set Operations
In 5th Conference on Information-Theoretic Cryptography, ITC 2024, August 14-16, 2024, Stanford, CA, USA (Divesh Aggarwal, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs), vol. to appear, (2024).
open access -
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
IACR Comm. in Cryptology. 1 (to appear), 1, (2024).
open access -
Secure Multi-Party Linear Algebra with Perfect Correctness
IACR Comm. in Cryptology. 1 (to appear), 1, (2024). -
Lattice attacks on pairing-based signatures
Inf. Secur. J. A Glob. Perspect. 33, 2, pp. 138-157 (2024).
open access doi
2023
-
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023, 4, pp. 188–210 (2023).
open access doi -
Cryptanalysis of a Generalized Subset-Sum Pseudorandom Generator
In 48th International Symposium on Mathematical Foundations of Computer Science, MFCS 2023, August 28 to September 1, 2023, Bordeaux, France (Jérôme Leroux, Sylvain Lombardy, and David Peleg, eds), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, LIPIcs, vol. 272, pp. 23:1–23:15 (2023).
open access doi -
Quantum security of subset cover problems
In 4th Conference on Information-Theoretic Cryptography, ITC 2023, June 6-8, 2023, Aarhus, Denmark (Kai-Min Chung, ed), Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs), vol. 267, pp. 9:1–9:17 (2023).
open access doi -
Commitments with Efficient Zero-Knowledge Arguments from Subset Sum Problems
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 189–208 (2023).
open access doi -
Efficient Zero-Knowledge Arguments and Digital Signatures via Sharing Conversion in the Head
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I (Gene Tsudik, Mauro Conti, Kaitai Liang, and Georgios Smaragdakis, eds), Springer, Lecture Notes in Computer Science, vol. 14344, pp. 435–454 (2023).
open access doi
2022
-
Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
open access doi -
Secure storage - Confidentiality and Authentication
Comput. Sci. Rev. 44, pp. 100465 (2022).
open access doi -
Cryptanalysis of Modular Exponentiation Outsourcing Protocols
Comput. J. 65, 9, pp. 2299-2314 (2022).
open access doi