| Publication | Date of Publication | Type |
|---|
| Split logarithm problem and a candidate for a post-quantum signature scheme | 2023-09-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5058426 | 2022-12-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5091556 | 2022-07-26 | Paper |
| A novel version of the hidden logarithm problem for post-quantum signature algorithms | 2022-05-23 | Paper |
| Digital signature scheme set in a hidden cyclic group | 2021-09-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5004765 | 2021-08-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5151172 | 2021-02-16 | Paper |
| Commutative Encryption Method Based on Hidden Logarithm Problem | 2021-01-12 | Paper |
| Digital signature scheme with doubled verification equation | 2020-11-02 | Paper |
| Post-quantum signature algorithms based on the hidden discrete logarithm problem | 2020-11-02 | Paper |
| Post-quantum commutative encryption algorithm | 2020-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4971463 | 2020-10-12 | Paper |
| No-Key Protocol for Deniable Encryption | 2020-08-20 | Paper |
| Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering | 2020-08-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5203997 | 2019-12-09 | Paper |
| Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem | 2019-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3119265 | 2019-03-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4684098 | 2018-09-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5376105 | 2018-09-17 | Paper |
| Provably sender-deniable encryption scheme | 2018-07-03 | Paper |
| Some applications of quasigroups in cryptology | 2018-07-03 | Paper |
| Stream deniable-encryption algorithms | 2018-07-03 | Paper |
| Non-commutative finite associative algebras of 2-dimensional vectors | 2018-07-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4977463 | 2017-08-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2833433 | 2016-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2831419 | 2016-11-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3464782 | 2016-01-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3464787 | 2016-01-27 | Paper |
| SOFTWARE ENCRYPTION ALGORITHMS FOR TRANSPARENT PROTECTION TECHNOLOGY | 2015-11-13 | Paper |
| FLEXIBLE BLOCK CIPHER WITH PROVABLY INEQUIVALENT CRYPTALGORITHM MODIFICATIONS | 2015-11-13 | Paper |
| Cryptoschemes based on difficulty of simultaneous solving two different difficult problems | 2015-09-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5250575 | 2015-05-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2926293 | 2014-10-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5168127 | 2014-07-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4916806 | 2013-04-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2896578 | 2012-07-16 | Paper |
| Blind collective signature protocol | 2012-01-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5199129 | 2011-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5748171 | 2010-09-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3565653 | 2010-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5306635 | 2010-04-09 | Paper |
| Information authentication in automated control systems based on finite groups with multidimensional cyclicity | 2009-11-24 | Paper |
| New algorithms and protocols for information authentication in automatic control systems | 2009-05-07 | Paper |
| Algorithms of information authentication for the automatic control systems on the basis of structures in finite vector spaces | 2009-02-26 | Paper |
| Digital signature scheme based on a new hard problem | 2008-11-10 | Paper |
| An approach to shorten digital signature length | 2007-06-26 | Paper |
| Variable bit permutations: linear characteristics and pure VBP-based cipher | 2005-11-21 | Paper |
| Algorithms for information conversion based on controlled two-place operations | 2005-08-12 | Paper |
| Controlled operation-based fast methods of data protection in automated control systems | 2005-06-17 | Paper |
| Protective data transformations in ACSs on the basis of a new primitive | 2005-06-17 | Paper |
| Fast DDP-based ciphers: Design and differential analysis of Cobra-H64 | 2004-10-28 | Paper |
| Flexible algorithms for protection of information in automatic control systems | 2004-10-19 | Paper |
| Fast data encryption for automatic control systems | 2004-10-13 | Paper |
| Fast software-oriented hash function based on data-dependent lookup operations | 2003-10-29 | Paper |
| Fault-based analysis of flexible ciphers | 2002-09-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4530851 | 2002-06-16 | Paper |
| A cipher based on data-dependent permutations | 2002-05-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4330562 | 2002-05-13 | Paper |
| Nondeterministic encryption with provable nonequivalence of all modifications of the cryptographic algorithm | 2000-09-26 | Paper |
| Software-implementable pseudoprobabilistic fast block ciphers | 1999-04-28 | Paper |
| Fast software encryption system based on local pseudorandomness | 1998-10-01 | Paper |
| Provably indeterminate 128-bit cipher | 1998-10-01 | Paper |
| Software encryption: New 64-bit block cryptoscheme | 1998-10-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4211193 | 1998-09-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4211195 | 1998-09-14 | Paper |
| New design principle for cryptographic modules in computer security systems | 1995-05-17 | Paper |