|||Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server , In Theoretical Computer Science, Elsevier, 2021. |
||| Round-Optimal Constant-Size Blind Signatures , In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020 (Pierangela Samarati, Sabrina De Capitani di Vimercati, Mohammad S. Obaidat, Jalel Ben-Othman, eds.), ScitePress, 2020.
||| Anonymous Identity Based Encryption with Traceable Identities , In Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019, ACM, 2019.