| Publication | Date of Publication | Type |
|---|
| Revisiting the constant-sum Winternitz one-time signature with applications to SPHINCS\textsuperscript{+} and XMSS | 2024-02-06 | Paper |
| Actively secure half-gates with minimum overhead under duplex networks | 2023-12-08 | Paper |
| A non-heuristic approach to time-space tradeoffs and optimizations for BKW | 2023-08-25 | Paper |
| A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding | 2023-08-21 | Paper |
| Packed multiplication: how to amortize the cost of side-channel masking? | 2023-03-21 | Paper |
| A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key | 2022-12-22 | Paper |
| Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation | 2022-12-09 | Paper |
| Cryptanalysis of candidate obfuscators for affine determinant programs | 2022-08-30 | Paper |
| The stability of a dynamic duopoly Cournot-Bertrand game model | 2022-06-16 | Paper |
| Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact | 2022-04-22 | Paper |
| Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN | 2022-04-22 | Paper |
| Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes | 2021-12-01 | Paper |
| An improved algorithm for learning sparse parities in the presence of noise | 2021-06-22 | Paper |
| The stability and duality of dynamic Cournot and Bertrand duopoly model with comprehensive preference | 2021-04-20 | Paper |
| The stability of Bayesian Nash equilibrium of dynamic Cournot duopoly model with asymmetric information | 2020-10-23 | Paper |
| Complex dynamical behaviors of a mixed duopoly game based on intellectual property rights protection | 2020-10-21 | Paper |
| The dynamic rent-seeking games with policymaker cost and competition intensity | 2020-10-14 | Paper |
| Valiant's universal circuits revisited: an overall improvement and a lower bound | 2020-05-20 | Paper |
| Collision resistant hashing from sub-exponential learning parity with noise | 2020-05-05 | Paper |
| Strong leakage and tamper-resilient PKE from refined hash proof system | 2020-01-30 | Paper |
| Robust sampled-data observer design for Lipschitz nonlinear systems | 2018-11-29 | Paper |
| Secure outsourcing of cryptographic circuits | 2018-11-07 | Paper |
| On the hardness of sparsely learning parity with noise | 2018-11-07 | Paper |
| On the robustness of learning parity with noise | 2018-10-26 | Paper |
| Data envelopment analysis cross-like efficiency model for non-homogeneous decision-making units: the case of United States companies' low-carbon investment to attain corporate sustainability | 2018-04-23 | Paper |
| Two-round PAKE from approximate SPH and instantiations from lattices | 2018-02-23 | Paper |
| Evaluation and improvement of generic-emulating DPA attacks | 2018-02-14 | Paper |
| Public key encryption resilient to leakage and tampering attacks | 2017-09-07 | Paper |
| Ridge-Based Profiled Differential Power Analysis | 2017-04-12 | Paper |
| Solving Stochastic Ship Fleet Routing Problems with Inventory Management Using Branch and Price | 2017-02-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2951543 | 2017-01-06 | Paper |
| Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN | 2016-11-30 | Paper |
| Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions | 2016-09-02 | Paper |
| Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations | 2016-08-31 | Paper |
| Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN | 2016-07-15 | Paper |
| (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond | 2015-12-10 | Paper |
| The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions | 2015-07-06 | Paper |
| Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model | 2015-02-19 | Paper |
| Pseudorandom generators from regular one-way functions: new constructions with improved parameters | 2015-01-28 | Paper |
| Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model | 2014-09-29 | Paper |
| Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree | 2014-01-28 | Paper |
| Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles | 2014-01-24 | Paper |
| Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters | 2013-12-10 | Paper |
| Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions | 2013-09-02 | Paper |
| Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness | 2013-03-18 | Paper |
| Overcoming Weak Expectations | 2013-03-18 | Paper |
| Leftover Hash Lemma, Revisited | 2011-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3568289 | 2010-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3405006 | 2010-02-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3642422 | 2009-11-11 | Paper |
| Hiding Circuit Topology from Unbounded Reverse Engineers | 2007-09-07 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |