| Publication | Date of Publication | Type |
|---|
| Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences | 2024-03-14 | Paper |
| Moving a step of ChaCha in syncopated rhythm | 2024-02-02 | Paper |
| Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls | 2023-12-08 | Paper |
| Amortizing division and exponentiation | 2023-08-21 | Paper |
| Generalized boomerang connectivity table and improved cryptanalysis of GIFT | 2023-08-21 | Paper |
| Cryptanalysis of Ciminion | 2023-08-21 | Paper |
| Higher-order masking scheme for Trivium hardware implementation | 2023-08-21 | Paper |
| Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP | 2023-06-30 | Paper |
| Conditional Cube Searching and Applications on Trivium-Variant Ciphers | 2023-06-30 | Paper |
| Properties of the cycles that contain all vectors of weight \(\le k\) | 2023-01-18 | Paper |
| Two new families of quantum synchronizable codes | 2022-12-23 | Paper |
| A two-round honest-verifier zero-knowledge protocol | 2022-10-28 | Paper |
| Bayesian mechanism for rational secret sharing scheme | 2022-10-28 | Paper |
| Generic Constructions of Revocable Identity-Based Encryption | 2022-10-14 | Paper |
| Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT | 2022-07-01 | Paper |
| Isomorphism and equivalence of Galois nonlinear feedback shift registers | 2022-07-01 | Paper |
| Binary sequences derived from monomial permutation polynomials over \(\mathrm{GF}(2^p)\) | 2022-07-01 | Paper |
| Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey | 2022-06-08 | Paper |
| Differential-linear cryptanalysis from an algebraic perspective | 2022-04-22 | Paper |
| Determining deep hole trees of generalized Reed-Solomon codes and an application | 2022-03-21 | Paper |
| The Adjacency Graphs of FSRs With Affine Characteristic Functions | 2022-02-17 | Paper |
| Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees | 2022-02-17 | Paper |
| On the \(k\)-error linear complexities of De Bruijn sequences | 2021-12-08 | Paper |
| On Galois NFSRs equivalent to Fibonacci ones | 2021-12-08 | Paper |
| Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems | 2021-11-11 | Paper |
| Analyzing Boolean functions via solving parametric polynomial systems | 2021-04-08 | Paper |
| Hierarchical group signatures with verifier-local revocation | 2021-01-18 | Paper |
| On the efficiency of solving Boolean polynomial systems with the characteristic set method | 2020-11-13 | Paper |
| Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks | 2020-07-16 | Paper |
| Longest subsequences shared by two de Bruijn sequences | 2020-07-15 | Paper |
| A new upper bound on the order of affine sub-families of NFSRs | 2020-05-13 | Paper |
| Refined analysis to the extended tower number field sieve | 2020-03-12 | Paper |
| Composition of Boolean functions: an application to the secondary constructions of bent functions | 2020-01-22 | Paper |
| Distribution properties of binary sequences derived from primitive sequences modulo square-free odd integers | 2019-10-31 | Paper |
| A note on rotation symmetric S-boxes | 2019-10-22 | Paper |
| Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains | 2019-10-14 | Paper |
| A new construction of zero-difference balanced functions and two applications | 2019-09-12 | Paper |
| Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach | 2019-07-19 | Paper |
| Further results on complete permutation monomials over finite fields | 2019-06-18 | Paper |
| A recursive construction of permutation polynomials over \(\mathbb F_{q^2}\) with odd characteristic related to Rédei functions | 2019-06-06 | Paper |
| A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity | 2019-05-17 | Paper |
| Multi-identity IBFHE and multi-attribute ABFHE in the standard model | 2019-03-29 | Paper |
| Speeding up the GVW algorithm via a substituting method | 2019-03-06 | Paper |
| The distribution of \(2^n\)-periodic binary sequences with fixed \(k\)-error linear complexity | 2018-12-07 | Paper |
| Fault attacks on stream cipher Scream | 2018-12-07 | Paper |
| Estimating differential-linear distinguishers and applications to CTC2 | 2018-12-07 | Paper |
| Combined cache timing attacks and template attacks on stream cipher MUGI | 2018-12-07 | Paper |
| The linear complexity and 2-error linear complexity distribution of \(2^n\)-periodic binary sequences with fixed Hamming weight | 2018-10-26 | Paper |
| On the division property of \textsc{Simon}48 and \textsc{Simon}64 | 2018-10-24 | Paper |
| Symbolic-like computation and conditional differential cryptanalysis of QUARK | 2018-10-24 | Paper |
| Anonymous identity-based encryption with identity recovery | 2018-09-26 | Paper |
| On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure | 2018-09-19 | Paper |
| Lower and Upper Bounds on the Density of Irreducible NFSRs | 2018-09-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4570861 | 2018-07-09 | Paper |
| Correlation cube attacks: from weak-key distinguisher to key recovery | 2018-07-09 | Paper |
| Improved key generation algorithm for Gentry's fully homomorphic encryption scheme | 2018-06-15 | Paper |
| Refinement of the four-dimensional GLV method on elliptic curves | 2018-04-26 | Paper |
| A game-based framework towards cyber-attacks on state estimation in ICSS | 2018-04-20 | Paper |
| Cryptanalysis of Acorn in nonce-reuse setting | 2018-04-20 | Paper |
| A class of three-weight and five-weight linear codes | 2018-04-10 | Paper |
| Complete weight enumerators of a class of three-weight linear codes | 2017-11-10 | Paper |
| Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions | 2017-07-12 | Paper |
| The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials | 2017-06-08 | Paper |
| Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers | 2017-05-16 | Paper |
| Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited | 2017-05-11 | Paper |
| Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher | 2017-05-05 | Paper |
| Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework | 2017-05-05 | Paper |
| Generalized Hamming Weights of Irreducible Cyclic Codes | 2017-04-28 | Paper |
| Complete weight enumerators of two classes of linear codes | 2017-04-03 | Paper |
| Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications | 2017-03-27 | Paper |
| On affine sub-families of Grain-like structures | 2017-02-17 | Paper |
| The adjacency graphs of some feedback shift registers | 2017-02-17 | Paper |
| A kind of three-weight linear codes | 2017-02-09 | Paper |
| Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers | 2017-02-01 | Paper |
| Complete weight enumerators of two classes of linear codes | 2016-12-22 | Paper |
| On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra | 2016-10-20 | Paper |
| Classifying and generating exact coset representatives of \(\operatorname{PGL}_2(\mathbb{F}_q)\) in \(\operatorname{PGL}_2(\mathbb{F}_{q^2})\) | 2016-10-10 | Paper |
| Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour | 2016-08-31 | Paper |
| An improvement over the GVW algorithm for inhomogeneous polynomial systems | 2016-07-29 | Paper |
| Generalized cyclotomic numbers of order two and their applications | 2016-07-01 | Paper |
| Solving Linear Equations Modulo Unknown Divisors: Revisited | 2016-06-10 | Paper |
| Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers | 2016-06-03 | Paper |
| Towards Optimal Bounds for Implicit Factorization Problem | 2016-05-19 | Paper |
| Further results on the nonlinearity of maximum-length NFSR feedbacks | 2016-04-11 | Paper |
| Linear complexity of Ding-Helleseth sequences of order 2 over \(\mathrm{GF}(l)\) | 2016-04-11 | Paper |
| A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers | 2016-03-23 | Paper |
| Generic constructions of integrated PKE and PEKS | 2016-02-19 | Paper |
| Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract) | 2016-01-11 | Paper |
| A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery | 2015-12-04 | Paper |
| Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions | 2015-12-02 | Paper |
| Omega Pairing on Hyperelliptic Curves | 2015-12-02 | Paper |
| Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails | 2015-11-25 | Paper |
| Improved domain extender for the ideal cipher | 2015-11-19 | Paper |
| Near Collision Attack on the Grain v1 Stream Cipher | 2015-09-18 | Paper |
| Linear complexity of binary generalized cyclotomic sequences over \(\mathrm{GF}(q)\) | 2015-08-24 | Paper |
| On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation | 2015-07-06 | Paper |
| On constructing complete permutation polynomials over finite fields of even characteristic | 2015-04-28 | Paper |
| A new linearization method for nonlinear feedback shift registers | 2015-02-20 | Paper |
| On the immunity of rotation symmetric Boolean functions against fast algebraic attacks | 2014-09-12 | Paper |
| Analysis of Optimum Pairing Products at High Security Levels | 2014-08-20 | Paper |
| New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents | 2014-07-07 | Paper |
| Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme | 2014-03-05 | Paper |
| Complete permutation polynomials induced from complete permutations of subfields | 2013-12-19 | Paper |
| A method for counting the number of polynomial equivalence classes | 2013-09-04 | Paper |
| New constructions of quaternary bent functions | 2013-09-01 | Paper |
| On enumeration of polynomial equivalence classes | 2013-08-05 | Paper |
| Improved bounds for the implicit factorization problem | 2013-07-31 | Paper |
| Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits | 2013-06-28 | Paper |
| Fast Evaluation of T-Functions via Time-Memory Trade-Offs | 2013-05-28 | Paper |
| Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks | 2013-05-28 | Paper |
| On Efficient Pairings on Elliptic Curves over Extension Fields | 2013-04-04 | Paper |
| An Improved Twisted Ate Pairing over KSS Curves with k = 18 | 2013-04-04 | Paper |
| Stronger Security Model for Public-Key Encryption with Equality Test | 2013-04-04 | Paper |
| Perfect Algebraic Immune Functions | 2013-03-19 | Paper |
| Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves | 2013-01-07 | Paper |
| Vladimir Sergeevich Anashin | 2012-11-13 | Paper |
| Anonymous Identity-Based Hash Proof System and Its Applications | 2012-11-06 | Paper |
| Identity-Based Extractable Hash Proofs and Their Applications | 2012-09-10 | Paper |
| Linear Weaknesses in T-functions | 2012-09-07 | Paper |
| The Initialization Stage Analysis of ZUC v1.5 | 2012-07-20 | Paper |
| Ergodic theory over \(\mathbb F_2 T\) | 2012-05-07 | Paper |
| On enumeration of polynomial equivalence classes and their application to MPKC | 2012-03-22 | Paper |
| Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2 | 2011-12-16 | Paper |
| Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge | 2011-12-02 | Paper |
| ON THE NONEXISTENCE of BENT FUNCTIONS | 2011-10-10 | Paper |
| Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks | 2011-07-07 | Paper |
| Attacking Bivium and Trivium with the Characteristic Set Method | 2011-06-29 | Paper |
| On designated-weight Boolean functions with highest algebraic immunity | 2011-02-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3062376 | 2011-01-03 | Paper |
| Refinement of Miller’s Algorithm Over Edwards Curves | 2010-03-16 | Paper |
| Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model | 2009-08-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610926 | 2009-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3611002 | 2009-03-06 | Paper |
| Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption | 2009-02-10 | Paper |
| Unlinkable Randomizable Signature and Its Application in Group Signature | 2009-02-10 | Paper |
| OPMAC: One-Key Poly1305 MAC | 2009-01-15 | Paper |
| Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps | 2009-01-09 | Paper |
| Novel \(\Omega\)-protocols for NP | 2008-03-31 | Paper |
| Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability | 2007-11-29 | Paper |
| Constructing parallel long-message signcryption scheme from trapdoor permutation | 2007-08-31 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| The internet accessible mathematical computation framework | 2007-02-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3411652 | 2006-12-11 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3365691 | 2006-01-23 | Paper |
| Computational Science - ICCS 2004 | 2005-12-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4675628 | 2005-05-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4790483 | 2003-06-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4550792 | 2003-02-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4790474 | 2003-01-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2725951 | 2002-11-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2747400 | 2002-07-28 | Paper |
| A class of generalized cyclic codes | 2002-04-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4705548 | 1999-12-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4705599 | 1999-12-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4234210 | 1999-03-16 | Paper |
| Well-behaved basis and LR arrays | 1996-07-08 | Paper |
| Structure and properties of linear recurring m-arrays | 1994-10-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279023 | 1994-09-26 | Paper |
| The equivalence classes of LR arrays | 1994-01-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5288886 | 1993-09-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4025575 | 1993-02-18 | Paper |
| Linear Recurring m-Arrays | 1988-01-01 | Paper |