Publication | Date of Publication | Type |
---|
Constructing Orientable Sequences | 2022-07-13 | Paper |
Minimal weight k-SR representations | 2018-03-21 | Paper |
On the Security of 2-Key Triple DES | 2017-04-28 | Paper |
Another Look at Privacy Threats in 3G Mobile Telephony | 2014-07-24 | Paper |
Analysing the IOBC Authenticated Encryption Mode | 2013-06-28 | Paper |
Single Sign-On Using Trusted Platforms | 2010-02-09 | Paper |
Cryptanalysis of the EPBC Authenticated Encryption Mode | 2008-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q5446585 | 2008-03-06 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Cryptography and Coding | 2007-11-28 | Paper |
ID-based cryptography using symmetric primitives | 2007-09-20 | Paper |
Cryptography and Coding | 2006-11-01 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information Security | 2006-10-20 | Paper |
Partial key recovery attack against RMAC | 2006-08-14 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4831221 | 2004-12-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450753 | 2004-02-16 | Paper |
Improvement of modified authenticated key agreement protocol | 2003-07-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484213 | 2003-06-12 | Paper |
Analysis of 3gpp-MAC and two-key 3gpp-MAC | 2003-06-10 | Paper |
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs | 2002-12-02 | Paper |
Undetachable Threshold Signatures | 2002-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149704 | 2002-09-26 | Paper |
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation | 2002-08-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501498 | 2002-08-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536801 | 2002-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536645 | 2002-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741429 | 2001-10-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502746 | 2000-11-07 | Paper |
On integer-valued rational polynomials and depth distributions of binary codes | 1999-11-21 | Paper |
Perfect Factors from Cyclic Codes and Interleaving | 1998-05-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373664 | 1998-01-21 | Paper |
De Bruijn Sequences and Perfect Factors | 1997-05-26 | Paper |
On the existence of de Bruijn tori with two by two windows | 1996-12-16 | Paper |
Redundant integer representations and fast exponentiation | 1996-12-12 | Paper |
A method for constructing decodable de Bruijn sequences | 1996-10-22 | Paper |
Aperiodic and semi-periodic perfect maps | 1996-06-03 | Paper |
Constructing \(c\)-ary perfect factors | 1995-03-05 | Paper |
Perfect binary arrays and difference sets | 1994-11-27 | Paper |
Decoding perfect maps | 1994-08-24 | Paper |
The Combinatorics of Perfect Authentication Schemes | 1994-04-19 | Paper |
Enumerating Boolean functions of cryptographic significance | 1990-01-01 | Paper |
Key-minimal cryptosystems for unconditional secrecy | 1990-01-01 | Paper |
Infinite families of quasiperfect and doubly quasiperfect binary arrays | 1990-01-01 | Paper |
Minimum weight modified signed-digit representations and fast exponentiation | 1989-01-01 | Paper |
One-stage one-sided rearrangeable switching networks | 1989-01-01 | Paper |
Key storage in secure networks | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3795461 | 1988-01-01 | Paper |
Permutations with Restricted Displacement | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3218141 | 1984-01-01 | Paper |