.- Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights.
.- Investigation of the Optimal Linear Characteristics of BAKSHEESH.
.- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.
.- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model.
.- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism.
.- A Formal Treatment of Envelope Encryption.
.- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption.
.- Experimental Analysis of the Optimization-based Factorization Algorithm.
.- Fast Private Set Intersection from Polynomial Multiplication Triples.
.- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation.
.- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.
.- Quantum Circuit for Curve25519 with Fewer Qubits.
.- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography.
.- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis.
.- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods.
.- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications.
.- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs.
.- LUA-IoT: Let's Usably Authenticate the IoT.
.- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors.
.- Malicious node identification based on behavioral statistical features and social relationships.
.- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System.
.- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities.
.- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.