| Publication | Date of Publication | Type |
|---|
| Lattice-based accumulator with constant time list update and constant time verification | 2023-10-04 | Paper |
| Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs | 2023-08-04 | Paper |
| PNB-focused differential cryptanalysis of ChaCha stream cipher | 2023-07-26 | Paper |
| Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity | 2022-12-21 | Paper |
| Message-Restriction-Free Commitment Scheme Based on Lattice Assumption | 2022-08-11 | Paper |
| Efficient FPGA design of exception-free generic elliptic curve cryptosystems | 2022-03-21 | Paper |
| Secure and compact elliptic curve LR scalar multiplication | 2021-06-08 | Paper |
| An improved security analysis on an indeterminate equation public key cryptosystem by evaluation attacks | 2020-07-21 | Paper |
| Secure and compact elliptic curve cryptosystems | 2020-05-27 | Paper |
| An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users | 2019-11-19 | Paper |
| A closer look at the Guo-Johansson-Stankovski attack against QC-MDPC codes | 2019-03-29 | Paper |
| New iterated RC4 key correlations | 2018-09-26 | Paper |
| On the computational complexity of ECDLP for elliptic curves in various forms using index calculus | 2018-06-15 | Paper |
| Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data | 2018-02-23 | Paper |
| Secure and Traceable Framework for Data Circulation | 2016-08-31 | Paper |
| Accurate Estimation of the Full Differential Distribution for General Feistel Structures | 2016-07-25 | Paper |
| Novel strategies for searching RC4 key collisions | 2016-07-06 | Paper |
| How TKIP Induces Biases of Internal States of Generic RC4 | 2015-10-20 | Paper |
| A Provable Secure Batch Authentication Scheme for EPCGen2 Tags | 2015-09-29 | Paper |
| Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree | 2015-09-22 | Paper |
| New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA | 2015-09-18 | Paper |
| A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 | 2015-09-11 | Paper |
| SKENO: Secret key encryption with non-interactive opening | 2015-08-07 | Paper |
| Dynamic attribute-based signcryption without random oracles | 2012-11-16 | Paper |
| A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users | 2012-11-01 | Paper |
| Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks | 2012-06-29 | Paper |
| How to Find Short RC4 Colliding Key Pairs | 2011-10-28 | Paper |
| A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model | 2011-07-29 | Paper |
| Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments | 2011-07-29 | Paper |
| T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity | 2011-07-07 | Paper |
| Toward Dynamic Attribute-Based Signcryption (Poster) | 2011-07-07 | Paper |
| A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root | 2011-04-20 | Paper |
| An Improved Fast Signature Scheme without Online Multiplication | 2011-04-20 | Paper |
| An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation | 2010-10-12 | Paper |
| A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication | 2010-10-12 | Paper |
| A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | 2010-09-22 | Paper |
| Generalized RC4 Key Collisions and Hash Collisions | 2010-09-10 | Paper |
| Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves | 2010-08-17 | Paper |
| New Correlations of RC4 PRGA Using Nonzero-Bit Differences | 2009-06-25 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA | 2008-05-06 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472405 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472071 | 2004-08-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450729 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4428383 | 2003-09-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418524 | 2003-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4788584 | 2003-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536244 | 2003-03-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536663 | 2002-11-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149733 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149760 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2763028 | 2002-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721157 | 2001-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4505601 | 2000-09-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249254 | 2000-07-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373641 | 1998-10-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341717 | 1997-08-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4314052 | 1995-02-19 | Paper |