| Publication | Date of Publication | Type |
|---|
| Circular external difference families, graceful labellings and cyclotomy | 2023-10-04 | Paper |
| Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes | 2023-09-12 | Paper |
| Boolean ring cryptographic equation solving | 2022-03-25 | Paper |
| On the equivalence of authentication codes and robust (2, 2)-threshold schemes | 2021-06-17 | Paper |
| PIR Schemes With Small Download Complexity and Low Storage Requirements | 2020-01-28 | Paper |
| Characterising bimodal collections of sets in finite groups | 2019-11-22 | Paper |
| Functional repair codes: a view from projective geometry | 2019-10-17 | Paper |
| Characterising bimodal collections of sets in finite groups | 2019-03-27 | Paper |
| Weighted external difference families and R-optimal AMD codes | 2019-01-22 | Paper |
| Multi-prover proof of retrievability | 2019-01-11 | Paper |
| Existence and non-existence results for strong external difference families | 2017-10-24 | Paper |
| Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks | 2017-07-27 | Paper |
| Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes | 2017-07-27 | Paper |
| Localised multisecret sharing | 2017-04-03 | Paper |
| Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families | 2016-08-16 | Paper |
| Cryptography | 2016-07-05 | Paper |
| On encoding symbol degrees of array BP-XOR codes | 2016-04-11 | Paper |
| Disjoint difference families and their applications | 2016-02-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3464681 | 2016-01-27 | Paper |
| Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs | 2015-12-07 | Paper |
| Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes | 2015-10-01 | Paper |
| A unified approach to combinatorial key predistribution schemes for sensor networks | 2014-04-29 | Paper |
| An Application-Oriented Framework for Wireless Sensor Network Key Establishment | 2013-12-06 | Paper |
| A simple combinatorial treatment of constructions and threshold gaps of ramp schemes | 2013-11-14 | Paper |
| A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage | 2013-11-12 | Paper |
| Constructions for retransmission permutation arrays | 2012-11-28 | Paper |
| Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures | 2012-02-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3089173 | 2011-08-24 | Paper |
| Honeycomb arrays | 2010-12-16 | Paper |
| Yet another hat game | 2010-06-16 | Paper |
| Combinatorial batch codes | 2010-03-10 | Paper |
| Geometric Ideas for Cryptographic Equation Solving in Even Characteristic | 2010-01-07 | Paper |
| Two attacks on a sensor network key distribution scheme of Cheng and Agrawal | 2009-03-03 | Paper |
| Efficient Key Predistribution for Grid-Based Wireless Sensor Networks | 2009-01-09 | Paper |
| Key Refreshing in Wireless Sensor Networks | 2009-01-09 | Paper |
| A geometric view of cryptographic equation solving | 2008-08-11 | Paper |
| Sliding-window dynamic frameproof codes | 2007-09-20 | Paper |
| Sequential and dynamic frameproof codes | 2007-09-20 | Paper |