| Publication | Date of Publication | Type |
|---|
| A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes | 2024-03-19 | Paper |
| New Families of MDS Symbol-Pair Codes From Matrix-Product Codes | 2024-03-19 | Paper |
| Hulls of Reed-Solomon Codes via Algebraic Geometry Codes | 2024-03-18 | Paper |
| Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes | 2024-03-14 | Paper |
| Efficient generation of elliptic curve cryptosystems | 2024-01-29 | Paper |
| Constructing quantum error-correcting codes that require a variable amount of entanglement | 2024-01-25 | Paper |
| A Construction of Asymptotically Optimal Cascaded CDC Schemes via Combinatorial Designs | 2023-09-08 | Paper |
| Type-II polyadic constacyclic codes over finite fields | 2023-07-14 | Paper |
| Sharper Asymptotically Optimal CDC Schemes via Combinatorial Designs | 2023-07-09 | Paper |
| Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications | 2023-07-07 | Paper |
| Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors | 2023-07-05 | Paper |
| Generalized negacyclic codes over finite fields | 2023-04-20 | Paper |
| On the construction of self-dual cyclic codes over \(\mathbb{Z}_4\) with arbitrary even length | 2022-10-06 | Paper |
| Asymmetric quantum Griesmer codes detecting a single bit-flip error | 2022-09-26 | Paper |
| A new framework for deniable secure key exchange | 2022-06-08 | Paper |
| Application of optimal \(p\)-ary linear codes to alphabet-optimal locally repairable codes | 2022-04-28 | Paper |
| Zero-knowledge proofs for committed symmetric Boolean functions | 2022-03-22 | Paper |
| A Comparison of Distance Bounds for Quasi-Twisted Codes | 2022-02-17 | Paper |
| Quasi-Cyclic Codes | 2021-11-26 | Paper |
| Patch-Based Holographic Image Sensing | 2021-11-19 | Paper |
| Adaptive oblivious transfer with access control from lattice assumptions | 2021-10-21 | Paper |
| New bounds on the minimum distance of cyclic codes | 2021-05-12 | Paper |
| An explicit expression for Euclidean self-dual cyclic codes of length \(2^k\) over Galois ring \(\mathrm{GR}(4,m)\) | 2021-04-08 | Paper |
| Public key encryption with equality test in the standard model | 2021-03-31 | Paper |
| Public key encryption with equality test from generic assumptions in the random oracle model | 2020-12-10 | Paper |
| Lightweight Key Encapsulation Using LDPC Codes on FPGAs | 2020-10-02 | Paper |
| On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications | 2020-09-29 | Paper |
| Provably Secure Group Signature Schemes From Code-Based Assumptions | 2020-09-29 | Paper |
| Threshold Changeable Ramp Secret Sharing | 2020-07-20 | Paper |
| Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case | 2020-06-04 | Paper |
| Holographic sensing | 2020-04-27 | Paper |
| Robust Positioning Patterns with Low Redundancy | 2020-03-25 | Paper |
| Forward-secure group signatures from lattices | 2020-02-25 | Paper |
| Semi-generic construction of public key encryption and identity-based encryption with equality test | 2020-02-06 | Paper |
| Accountable tracing signatures from lattices | 2020-01-28 | Paper |
| Burst-Deletion-Correcting Codes for Permutations and Multipermutations | 2020-01-28 | Paper |
| Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes | 2019-11-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5241187 | 2019-10-30 | Paper |
| Binary Robust Positioning Patterns with Low Redundancy and Efficient Locating Algorithms | 2019-10-15 | Paper |
| Construction and enumeration for self-dual cyclic codes over \(\mathbb Z_4\) of oddly even length | 2019-09-12 | Paper |
| Lattice-based group signatures: achieving full dynamicity (and deniability) with ease | 2019-08-13 | Paper |
| Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories | 2019-07-19 | Paper |
| On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials | 2019-05-17 | Paper |
| New MILP modeling: improved conditional cube attacks on KECCAK-based constructions | 2019-01-23 | Paper |
| Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption | 2019-01-18 | Paper |
| Revocable predicate encryption from lattices | 2018-11-07 | Paper |
| Lattice-based zero-knowledge arguments for integer relations | 2018-09-26 | Paper |
| The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields | 2018-08-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4570855 | 2018-07-09 | Paper |
| Constant-size group signatures from lattices | 2018-05-29 | Paper |
| A lattice-based group signature scheme with verifier-local revocation | 2018-05-17 | Paper |
| Adaptive oblivious transfer with access control from lattice assumptions | 2018-04-06 | Paper |
| Zero-knowledge arguments for lattice-based PRFs and applications to E-cash | 2018-02-23 | Paper |
| Construction of de Bruijn sequences from product of two irreducible polynomials | 2018-02-14 | Paper |
| Hardness of \(k\)-LWE and applications in traitor tracing | 2018-01-05 | Paper |
| Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions | 2017-08-08 | Paper |
| On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions | 2017-08-08 | Paper |
| Hulls of cyclic and negacyclic codes over finite fields | 2017-08-03 | Paper |
| Linear Size Optimal $q$-ary Constant-Weight Codes and Constant-Composition Codes | 2017-07-27 | Paper |
| On Self-Dual Cyclic Codes Over Finite Fields | 2017-07-27 | Paper |
| Application of Classical Hermitian Self-Orthogonal MDS Codes to Quantum MDS Codes | 2017-07-27 | Paper |
| Generalization of Steane's Enlargement Construction of Quantum Codes and Applications | 2017-07-27 | Paper |
| Asymmetric Quantum Codes: Characterization and Constructions | 2017-07-27 | Paper |
| Authentication of Digital Streams | 2017-07-12 | Paper |
| Additive Asymmetric Quantum Codes | 2017-07-12 | Paper |
| Abelian Codes in Principal Ideal Group Algebras | 2017-06-08 | Paper |
| CSS-Like Constructions of Asymmetric Quantum Codes | 2017-06-08 | Paper |
| Upper Bounds on Matching Families in <formula formulatype="inline"> <tex Notation="TeX">$\BBZ_{pq}^{n}$</tex></formula> | 2017-06-08 | Paper |
| External Difference Families from Finite Fields | 2017-05-23 | Paper |
| Hermitian Self-Dual Abelian Codes | 2017-05-16 | Paper |
| Spectral Analysis of Quasi-Cyclic Product Codes | 2017-04-28 | Paper |
| Polyadic Constacyclic Codes | 2017-04-28 | Paper |
| Application of Constacyclic Codes to Quantum MDS Codes | 2017-04-28 | Paper |
| Three new classes of optimal frequency-hopping sequence sets | 2017-03-23 | Paper |
| Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption | 2017-01-06 | Paper |
| Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions | 2017-01-06 | Paper |
| On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs | 2016-10-21 | Paper |
| On self-dual cyclic codes of length \(p^a\) over \(\mathrm{GR}(p^2,s)\) | 2016-10-12 | Paper |
| Enumeration formulas for self-dual cyclic codes | 2016-10-10 | Paper |
| Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors | 2016-07-15 | Paper |
| Analysis of Gong et al.'s CCA2-secure homomorphic encryption | 2016-07-05 | Paper |
| A Provably Secure Group Signature Scheme from Code-Based Assumptions | 2016-06-10 | Paper |
| Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers | 2015-12-04 | Paper |
| Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based | 2015-08-27 | Paper |
| Quasi-abelian codes | 2015-03-12 | Paper |
| Construction of Quasi-Cyclic Product Codes | 2015-01-26 | Paper |
| Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 | 2015-01-16 | Paper |
| On the Multidimensional Distribution of the Naor–Reingold Pseudo-Random Function | 2014-09-10 | Paper |
| A relation between embedding degrees and class numbers of binary quadratic forms | 2014-09-10 | Paper |
| Spatial encryption supporting non-monotone access structure | 2014-09-04 | Paper |
| Shorter identity-based encryption via asymmetric pairings | 2014-09-04 | Paper |
| Homogeneous weights of matrix product codes over finite principal ideal rings | 2014-09-02 | Paper |
| Hardness of k-LWE and Applications in Traitor Tracing | 2014-08-07 | Paper |
| The resistance of PRESENT-80 against related-key differential attacks | 2014-06-20 | Paper |
| Matrix product codes over finite commutative Frobenius rings | 2014-04-29 | Paper |
| The relation and transformation between hierarchical inner product encryption and spatial encryption | 2014-04-29 | Paper |
| New results on two hypercube coloring problems | 2014-04-23 | Paper |
| Lattice-Based Group Signature Scheme with Verifier-Local Revocation | 2014-03-25 | Paper |
| Revocable IBE Systems with Almost Constant-Size Key Update | 2014-02-18 | Paper |
| On the Fourier Spectra of New APN Functions | 2013-09-26 | Paper |
| PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION | 2013-08-28 | Paper |
| Algebraic Curves in Cryptography | 2013-07-15 | Paper |
| Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications | 2013-04-19 | Paper |
| Query-efficient locally decodable codes of subexponential length | 2013-04-11 | Paper |
| Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU | 2013-04-04 | Paper |
| Shorter IBE and Signatures via Asymmetric Pairings | 2013-04-04 | Paper |
| A \(q\)-polynomial approach to cyclic codes | 2013-03-20 | Paper |
| Differential Attacks against Stream Cipher ZUC | 2013-03-19 | Paper |
| Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures | 2013-03-18 | Paper |
| On the (In)Security of IDEA in Various Hashing Modes | 2013-01-08 | Paper |
| Revocable Identity-Based Encryption from Lattices | 2012-09-07 | Paper |
| NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model | 2012-07-20 | Paper |
| Constructing irreducible polynomials over finite fields | 2012-06-29 | Paper |
| Skew constacyclic codes over finite chain rings | 2012-05-11 | Paper |
| On the modular inversion hidden number problem | 2012-05-04 | Paper |
| Threshold changeable secret sharing schemes revisited | 2012-03-13 | Paper |
| A note on cyclic codes over \(\mathrm{GR}(p^{2},m)\) of length \(p^{k}\) | 2012-03-01 | Paper |
| Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences | 2012-02-17 | Paper |
| A note on linearized polynomials and the dimension of their kernels | 2012-02-11 | Paper |
| Side-channel resistant crypto for less than 2,300 GE | 2012-01-18 | Paper |
| Structure of functional codes defined on non-degenerate Hermitian varieties | 2011-10-21 | Paper |
| List decodability at small radii | 2011-09-27 | Paper |
| Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) | 2011-07-07 | Paper |
| Pushing the Limits: A Very Compact and a Threshold Implementation of AES | 2011-05-27 | Paper |
| From skew-cyclic codes to asymmetric quantum codes | 2011-05-17 | Paper |
| Association schemes arising from bent functions | 2011-04-08 | Paper |
| Checkable Codes from Group Rings | 2010-12-26 | Paper |
| Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | 2010-12-07 | Paper |
| 256 Bit Standardized Crypto for 650 GE – GOST Revisited | 2010-08-17 | Paper |
| On the constructions of constant-composition codes from perfect nonlinear functions | 2010-02-26 | Paper |
| Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes | 2010-01-07 | Paper |
| Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 | 2009-12-09 | Paper |
| Cryptanalysis of the LAKE Hash Family | 2009-08-11 | Paper |
| New informations on the structure of the functional codes defined by forms of degree $h$ on non-degenerate Hermitian varieties in $\mathbb{P}^{n(\mathbb{F}_q)$} | 2009-07-27 | Paper |
| Intersection of two quadrics with no common hyperplane in $\mathbb{P}^{n}(\mathbb{F}_q)$}} | 2009-07-27 | Paper |
| Constructions and bounds on linear error-block codes | 2009-03-31 | Paper |
| Improved Lower Bounds for Constant GC-Content DNA Codes | 2009-02-24 | Paper |
| Access Structures of Elliptic Secret Sharing Schemes | 2009-02-24 | Paper |
| The Sizes of Optimal $q$-Ary Codes of Weight Three and Distance Four: A Complete Solution | 2009-02-24 | Paper |
| Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes | 2009-02-10 | Paper |
| Quantum Codes From Concatenated Algebraic-Geometric Codes | 2008-12-21 | Paper |
| Asymptotic bounds on quantum codes from algebraic geometry codes | 2008-12-21 | Paper |
| New lower bounds and constructions for binary codes correcting asymmetric errors | 2008-12-21 | Paper |
| An Improvement on the Bounds of Weil Exponential Sums Over Galois Rings With Some Applications | 2008-12-21 | Paper |
| On the Algebraic Structure of Quasi-Cyclic Codes III: Generator Theory | 2008-12-21 | Paper |
| Polyadic Codes Revisited | 2008-12-21 | Paper |
| On the reliability-order-based decoding algorithms for binary linear block codes | 2008-12-21 | Paper |
| The Probability of Undetected Error for Binary Constant-Weight Codes | 2008-12-21 | Paper |
| Constructions for $q$-Ary Constant-Weight Codes | 2008-12-21 | Paper |
| A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes | 2008-12-21 | Paper |
| Cycle Systems in the Complete Bipartite Graph Plus a One-Factor | 2008-12-05 | Paper |
| Cryptanalysis of Rabbit | 2008-11-20 | Paper |
| Cryptanalysis of LASH | 2008-09-18 | Paper |
| Some constructions of \((t,m,s)\)-nets with improved parameters | 2008-08-27 | Paper |
| Cyclic codes over \(\text{GR}(p^2,m)\) of length \(p^k\) | 2008-08-27 | Paper |
| Improved p-ary Codes and Sequence Families from Galois Rings | 2008-03-14 | Paper |
| Coding and Cryptography | 2007-05-02 | Paper |
| Improved p-ary Codes and Sequence Families from Galois Rings of Characteristic p2 | 2006-06-01 | Paper |
| On the algebraic structure of quasi-cyclic codes. IV: Repeated roots | 2006-05-29 | Paper |
| Cyclic codes over \(\mathbb Z_4\) of even length | 2006-05-29 | Paper |
| An explicit class of codes with good parameters and their duals | 2006-04-28 | Paper |
| A class of Artin-Schreier towers with finite genus | 2006-01-17 | Paper |
| Good self-dual quasi-cyclic codes exist | 2005-06-01 | Paper |
| Z(p/sup k+1/)-linear codes | 2005-05-11 | Paper |
| On the variance of average distance of subsets in the Hamming space | 2005-02-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3154859 | 2005-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3154865 | 2005-01-14 | Paper |
| A family of group character codes | 2004-08-06 | Paper |
| \(\mathbb Z_{8}\)-Kerdock codes and pseudorandom binary sequences | 2004-08-06 | Paper |
| On Viterbi-like algorithms and their application to Reed-Muller codes | 2004-08-06 | Paper |
| Duadic codes over \(\mathbb{F}_2+u\mathbb{F}_2\) | 2004-02-18 | Paper |
| Type II codes over \(\mathbb{F}_{2^m} + u\mathbb{F}_{2^m}\) | 2004-02-02 | Paper |
| Symmetric polynomials and some good codes | 2003-09-30 | Paper |
| On the algebraic structure of quasi-cyclic codes. II: Chain rings | 2003-09-07 | Paper |
| Nonlinear \(p\)-ary sequences | 2003-09-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4792355 | 2003-07-22 | Paper |
| Highly symmetric expanders | 2002-09-30 | Paper |
| Duadic codes over Z/sub 2k/ | 2002-08-04 | Paper |
| Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound | 2002-08-04 | Paper |
| On the algebraic structure of quasi-cyclic codes .I. Finite fields | 2002-08-04 | Paper |
| New binary linear codes from algebraic curves | 2002-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4330636 | 2002-05-14 | Paper |
| Type II codes over \(\mathbb{F}_4+u\mathbb{F}_4\) | 2002-05-05 | Paper |
| Maps between Jacobians of Shimura curves and congruence kernels | 2002-05-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2741437 | 2001-10-15 | Paper |
| Constructions of semi-regular relative difference sets | 2001-09-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2708637 | 2001-07-17 | Paper |
| A class of linear codes with good parameters | 2001-03-19 | Paper |
| Secret-sharing with a class of ternary codes | 2000-10-26 | Paper |
| Component group of the \(p\)-new subvariety of \(J_0 (Mp)\) | 2000-09-19 | Paper |
| Elementary 2-group character codes | 2000-09-07 | Paper |
| Split group codes | 2000-09-07 | Paper |
| A class of linear codes with good parameters from algebraic curves | 2000-09-07 | Paper |
| Attack on RSA-type cryptosystems based on singular cubic curves over \(\mathbb{Z}/n\mathbb{Z}\) | 2000-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4486236 | 2000-06-26 | Paper |
| Combinatorial coverings from geometries over principal ideal rings | 2000-06-07 | Paper |
| The rank of a latin square associated to an abelian group | 2000-03-23 | Paper |
| On component groups of 𝐽₀(𝑁) and degeneracy maps | 1998-09-22 | Paper |
| Almost perfect sequences with \(\theta =2\) | 1998-07-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4364588 | 1997-12-15 | Paper |
| On the \(\mathbb{Q}\)-rational cuspidal subgroup and the component group of \(J_0(p^r)\) | 1997-12-14 | Paper |
| On the rational cuspidal subgroup and the rational torsion points of $J_0(pq)$ | 1997-12-11 | Paper |
| Shimura subgroups and degeneracy maps | 1996-10-27 | Paper |
| The old subvariety of \(J_ 0(pq)\) and the Eisenstein kernel in Jacobians | 1994-11-27 | Paper |
| Shimura Subgroups of Jacobians of Shimura Curves | 1994-09-15 | Paper |
| Congruences between cusp forms and the geometry of Jacobians of modular curves | 1994-06-16 | Paper |
| The Fitting ideal of \(J_ 0(q)(\mathbb{F}_{p^ n})\) over the Hecke algebra | 1994-06-06 | Paper |
| Projective Covering Designs | 1994-05-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4026195 | 1993-02-21 | Paper |