1. Password-authenticated key exchange from group actions;Abdalla,2022
2. Cryptographic group actions and applications;Alamati,2020
3. Two-round adaptively secure MPC from isogenies, lpn, or CDH;Alamati,2021
4. Pseudoentropic isometries: a new framework for fuzzy extractor reusability;Alamélou,2018
5. Efficient, reusable fuzzy extractors from LWE;Apon,2017