| Publication | Date of Publication | Type |
|---|
| Fast blind rotation for bootstrapping FHEs | 2024-02-06 | Paper |
| New method for combining Matsui's bounding conditions with sequential encoding method | 2023-11-07 | Paper |
| Security model and modular design of fair authentication key exchange protocols | 2022-10-28 | Paper |
| A property-based attestation protocol for TCM | 2022-10-28 | Paper |
| On constant-round zero-knowledge proofs of knowledge for NP-relations | 2022-10-28 | Paper |
| Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V | 2022-09-22 | Paper |
| FAN: a lightweight authenticated cryptographic algorithm | 2021-12-20 | Paper |
| Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System | 2020-07-20 | Paper |
| Practical cryptanalysis of Bluetooth encryption with condition masking | 2018-05-28 | Paper |
| Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme | 2018-04-20 | Paper |
| New Results on Periodic Sequences With Large $k$-Error Linear Complexity | 2017-08-08 | Paper |
| The Weight Enumerator of a Class of Cyclic Codes | 2017-07-27 | Paper |
| Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round | 2017-05-19 | Paper |
| Boolean functions and their applications in cryptography | 2016-12-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2993260 | 2016-08-10 | Paper |
| Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$ | 2015-12-02 | Paper |
| Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP | 2015-11-20 | Paper |
| ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication | 2015-11-03 | Paper |
| Near Collision Attack on the Grain v1 Stream Cipher | 2015-09-18 | Paper |
| A Clustering Approach for Privacy-Preserving in Social Networks | 2015-09-11 | Paper |
| Linear Cryptanalysis of FASER128/256 and TriviA-ck | 2015-09-10 | Paper |
| Computing Walsh coefficients from the algebraic normal form of a Boolean function | 2014-10-08 | Paper |
| ExBLACR: Extending BLACR System | 2014-07-24 | Paper |
| On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture | 2014-01-27 | Paper |
| Cube Attack on Grain | 2013-11-19 | Paper |
| Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking | 2013-09-02 | Paper |
| Round-optimal zero-knowledge proofs of knowledge for NP | 2013-08-20 | Paper |
| Improved multi-pass fast correlation attacks with applications | 2013-07-03 | Paper |
| Cryptanalysis of Helix and Phelix Revisited | 2013-06-28 | Paper |
| Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha | 2013-06-04 | Paper |
| Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures | 2013-03-18 | Paper |
| (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others | 2013-01-08 | Paper |
| Benchmarking for Steganography by Kernel Fisher Discriminant Criterion | 2013-01-07 | Paper |
| On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 | 2013-01-07 | Paper |
| Combined Public-Key Schemes: The Case of ABE and ABS | 2012-11-06 | Paper |
| Fully Secure Doubly-Spatial Encryption under Simple Assumptions | 2012-11-06 | Paper |
| An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks | 2012-11-01 | Paper |
| Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers | 2012-09-10 | Paper |
| Black-box testing based on colorful taint analysis | 2012-08-17 | Paper |
| Comments on the SM2 Key Exchange Protocol | 2012-07-20 | Paper |
| Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge | 2011-12-02 | Paper |
| ON GUESS AND DETERMINE ANALYSIS OF RABBIT | 2011-10-10 | Paper |
| Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost | 2011-09-16 | Paper |
| Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher | 2011-07-29 | Paper |
| Loiss: A Byte-Oriented Stream Cipher | 2011-06-08 | Paper |
| How to Characterize Side-Channel Leakages More Accurately? | 2011-05-19 | Paper |
| A Byte-Based Guess and Determine Attack on SOSEMANUK | 2010-12-07 | Paper |
| An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network | 2010-11-23 | Paper |
| Some results on cryptanalysis of SMS4 block cipher | 2010-09-22 | Paper |
| Cryptanalysis of the LANE Hash Function | 2009-12-09 | Paper |
| An Improved Fast Correlation Attack on Stream Ciphers | 2009-11-03 | Paper |
| Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model | 2009-08-18 | Paper |
| A New Client-to-Client Password-Authenticated Key Agreement Protocol | 2009-07-23 | Paper |
| Security of Truncated MACs | 2009-04-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610330 | 2009-03-06 | Paper |
| Spectral characteristics of the best affine approach of multi-output m-valued logical functions | 2009-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610926 | 2009-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610956 | 2009-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610971 | 2009-03-06 | Paper |
| On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences | 2009-02-24 | Paper |
| Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/ | 2008-12-21 | Paper |
| On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields | 2008-12-21 | Paper |
| On Quadratic Bent Functions in Polynomial Forms | 2008-12-21 | Paper |
| On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences | 2008-11-27 | Paper |
| On the Unprovable Security of 2-Key XCBC | 2008-07-08 | Paper |
| New Results on Impossible Differential Cryptanalysis of Reduced AES | 2008-05-06 | Paper |
| Cryptanalysis of the Hash Functions MD4 and RIPEMD | 2008-05-06 | Paper |
| New Guess-and-Determine Attack on the Self-Shrinking Generator | 2008-04-24 | Paper |
| Symmetric Nonce Respecting Security Model and the MEM Mode of Operation | 2008-04-11 | Paper |
| Related-Key Differential-Linear Attacks on Reduced AES-192 | 2008-04-11 | Paper |
| Short Threshold Signature Schemes Without Random Oracles | 2008-03-17 | Paper |
| On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences | 2008-03-14 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 | 2007-11-29 | Paper |
| Multi-pass Fast Correlation Attack on Stream Ciphers | 2007-11-29 | Paper |
| Survey of information security | 2007-10-12 | Paper |
| Modular approach to the design and analysis of password-based security protocols | 2007-10-12 | Paper |
| Constructing parallel long-message signcryption scheme from trapdoor permutation | 2007-08-31 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3436663 | 2007-05-11 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Theory and Applications of Models of Computation | 2007-04-30 | Paper |
| Linear cryptanalysis of NUSH block cipher | 2007-02-20 | Paper |
| Cryptanalysis of AW digital signature scheme based on error-correcting codes | 2007-02-20 | Paper |
| Collision attack on reduced-round Camellia | 2007-02-20 | Paper |
| An attack on hash function HAVAL-128 | 2007-02-20 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information Security | 2006-10-20 | Paper |
| Security analysis of a new stream cipher | 2006-10-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5491195 | 2006-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5491200 | 2006-10-10 | Paper |
| An Arbitrated Quantum Message Signature Scheme | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5478246 | 2006-07-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5469537 | 2006-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5469563 | 2006-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5718901 | 2006-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5718904 | 2006-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5718907 | 2006-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5715831 | 2006-01-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5714529 | 2006-01-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5714532 | 2006-01-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5714535 | 2006-01-03 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Cryptanalysis of some signature schemes with message recovery | 2005-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700983 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700993 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5701001 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5699432 | 2005-10-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5315752 | 2005-09-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5314422 | 2005-09-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5314426 | 2005-09-05 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4673991 | 2005-05-09 | Paper |
| On Lin-Bose problem | 2004-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823843 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823909 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823929 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4470906 | 2004-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4466828 | 2004-06-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450658 | 2004-02-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450661 | 2004-02-15 | Paper |
| Study on strand space model theory | 2003-11-06 | Paper |
| Three characterizations of correlation-immune functions over the rings \(Z_N\) | 2000-08-23 | Paper |
| Maximum correlation analysis of nonlinear combining functions | 1998-08-20 | Paper |
| Judging of the orthogonal system over rings \(\mathbb{Z}_ N\) | 1998-06-11 | Paper |
| A sufficient and necessary condition of judging the independence of Boolean functions system | 1996-09-16 | Paper |
| Spectral representation of correspondence of multi-valued logical functions | 1995-11-28 | Paper |