- Crypto & Applied crypto.- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training.- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption.- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing.- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection.- Homomorphic encryption.- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts.- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions.
- Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM.- Key agreement protocols and digital signature schemes.- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme.- Formal analysis of Julia Key Agreement Protocol.- New Construction of Code-Based Signature Schemes.- Identity-Based Signature from Lattices without Trapdoors.- Defences.- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps.
- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot.- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning.- Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases.- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting.