| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | — | conf |
WPES
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2022 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2021 | A | conf |
CSF
|
| 2021 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2020 | J | jnl |
Inf. Process. Lett.
|
| 2020 | — | conf |
AFRICACRYPT
|
| 2020 | A | conf |
CSF
|
| 2020 | Misc | conf |
ACISP
|
| 2020 | — | conf |
Public Key Cryptography (1)
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
Inf. Process. Lett.
|
| 2019 | Misc | conf |
INDOCRYPT
|
| 2018 | J | jnl |
Int. J. Inf. Sec.
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
Inf. Process. Lett.
|
| 2017 | — | conf |
Financial Cryptography Workshops
|
| 2016 | J | jnl |
CoRR
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
Des. Codes Cryptogr.
|
| 2016 | C | conf |
CloudCom
|
| 2016 | — | conf |
CRYPTO (3)
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | J | jnl |
ACM Trans. Embed. Comput. Syst.
|
| 2014 | — | conf |
WISEC
|
| 2014 | — | conf |
ESORICS (2)
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
WPES
|
| 2012 | — | conf |
ISSE
|
| 2012 | A | conf |
Privacy Enhancing Technologies
|
| 2011 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2011 | — | conf |
Information Hiding
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | — | conf |
WPES
|
| 2010 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2010 | — | conf |
AFRICACRYPT
|
| 2010 | A* | conf |
USENIX Security Symposium
|
| 2010 | — | conf |
HotSec
|
| 2009 | — | conf |
Public Key Cryptography
|
| 2009 | C | conf |
Pairing
|