Publication | Date of Publication | Type |
---|
Lattice-based cryptography: a survey | 2024-01-04 | Paper |
Qin's Algorithm, Continued Fractions and 2-dimensional Lattices | 2023-10-13 | Paper |
On the measurement and simulation of the BKZ behavior for \(q\)-ary lattices | 2023-08-21 | Paper |
On an attack on RSA with small CRT-exponents | 2022-10-28 | Paper |
More accurate geometric analysis on the impact of successful decryptions for IND-CCA secure Ring/Mod-LWE/LWR based schemes | 2022-07-06 | Paper |
Computational aspects of lattices and their cryptographic applications | 2022-03-21 | Paper |
Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited | 2022-02-17 | Paper |
Pre-computation scheme of window \(\tau\)NAF for Koblitz curves revisited | 2021-12-08 | Paper |
On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors | 2021-12-08 | Paper |
Discrete Gaussian measures and new bounds of the smoothing parameter for lattices | 2021-11-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4633838 | 2019-05-06 | Paper |
Shifting Inequality and Recovery of Sparse Signals | 2018-07-09 | Paper |
A Remark on Fourier Transform | 2018-07-03 | Paper |
Fast scalar multiplication for elliptic curves over binary fields by efficiently computable formulas | 2018-04-26 | Paper |
On Recovery of Sparse Signals Via $\ell _{1}$ Minimization | 2017-08-08 | Paper |
New Bounds for Restricted Isometry Constants | 2017-07-27 | Paper |
Stable Recovery of Sparse Signals and an Oracle Inequality | 2017-07-27 | Paper |
Provably Secure NTRU Instances over Prime Cyclotomic Rings | 2017-06-13 | Paper |
Conditional Cube Attack on Reduced-Round Keccak Sponge Function | 2017-06-13 | Paper |
On the Optimal Pre-Computation of Window NAF for Koblitz Curves | 2017-05-16 | Paper |
Compressed Sensing Matrices From Fourier Matrices | 2017-04-28 | Paper |
Dynamics of linear systems over finite commutative rings | 2017-01-26 | Paper |
A polynomial time algorithm for GapCVPP in \(l_1\) norm | 2015-11-20 | Paper |
Mathematical Foundations of Public Key Cryptography | 2015-10-07 | Paper |
A note on BDD problems with \(\lambda_2\)-gap | 2015-06-25 | Paper |
On a query algorithm for a divisibility problem | 2015-02-24 | Paper |
On the \(\ell_1\)-norm invariant convex \(k\)-sparse decomposition of signals | 2014-09-30 | Paper |
Measure inequalities and the transference theorem in the geometry of numbers | 2013-11-14 | Paper |
Fast arithmetics using Chinese remaindering | 2010-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3405355 | 2010-02-12 | Paper |
A note on window \(\tau\)-NAF algorithm | 2009-12-04 | Paper |
New Birthday Attacks on Some MACs Based on Block Ciphers | 2009-10-20 | Paper |
On stars and Steiner stars | 2009-08-19 | Paper |
Linear dynamical systems over finite rings | 2009-06-17 | Paper |
Nonadjacent Radix-τ Expansions of Integers in Euclidean Imaginary Quadratic Number Fields | 2008-12-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3512705 | 2008-07-21 | Paper |
Refinements of Miller's algorithm for computing the Weil/Tate pairing | 2006-04-28 | Paper |
Efficient algorithms for Koblitz curves over fields of characteristic three | 2005-05-04 | Paper |
The weak closure of the set of left translation operators | 1998-11-18 | Paper |
Herz-Schur multipliers and weakly almost periodic functions on locally compact groups | 1997-05-13 | Paper |
Amenability and Uniformly Continuous Functionals on the Algebras A p (G) for Discrete Groups | 1997-01-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4204342 | 1988-01-01 | Paper |
Disjunctive decomposition of languages | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3727404 | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3750131 | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3746903 | 1985-01-01 | Paper |