| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2015 | — | conf |
Public Key Cryptography
|
| 2015 | — | conf |
Public Key Cryptography
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | conf |
CRYPTO (1)
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | — | — |
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | A* | conf |
USENIX Security Symposium
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | A* | conf |
IEEE Symposium on Security and Privacy
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
CRYPTO (2)
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | A* | conf |
EUROCRYPT
|
| 2012 | — | conf |
CCSW
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A* | conf |
CRYPTO
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | A* | conf |
CCS
|