.- Public Key Cryptosystems.
.- Extended Policy-based Sanitizable Signatures.
.- Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations.
.- Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage.
.- Generalized Cryptanalysis of Cubic Pell RSA.
.- On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms.
.- Hierarchical Functional Encryption for Quadratic Transformation.
.- Solving Modular Linear Equations via Automated Coppersmith and its Applications.
.- How to Construct Public Timeline for RSA-formed Time-Lock Cryptography.
.- Security Protocols Analysis.
.- Permutation Argument via Bases Transformation.
.- Efficient and Verifiable Multi-Server Framework for Secure Information Classification and Storage.
.- Formal Analysis of WAPI Authentication and Key Agreement Protocol.
.- Symmetric Cryptanalysis.
.- Committing Security of AEAD Based on Stream Cipher.
.- Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method.
.- Cube Attacks against Trivium, Kreyvium and ACORN with Practical Complexity..
.- Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers.
.- A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.
.- An Automatic Search Method For 4-bit S-box Towards Considering Cryptographic Properties and Hardware Area Simultaneously.
.- Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations: Improved attacks on TWINE and LBlock.
.- Cryptanalysis of BAKSHEESH Block Cipher.
.- Quantum and Post Quantum Cryptography.
.- Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack.
.- Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINE.
.- Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON.
.- Quantum Public-Key Encryption of Quantum States, and More.