| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2017 | — | — |
|
| 2017 | J | jnl |
J. Cryptol.
|
| 2016 | — | conf |
Financial Cryptography Workshops
|
| 2015 | — | conf |
VoteID
|
| 2014 | — | conf |
Public Key Cryptography
|
| 2014 | — | conf |
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Public Key Cryptography
|
| 2014 | C | conf |
SECRYPT
|
| 2013 | — | conf |
CRYPTO (2)
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
CoRR
|
| 2011 | — | conf |
AFRICACRYPT
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|