Publication | Date of Publication | Type |
---|
On the Sixth International Olympiad in Cryptography NSUCRYPTO | 2022-07-15 | Paper |
Resilient uniformity: applying resiliency in masking | 2022-04-25 | Paper |
Practically efficient secure distributed exponentiation without bit-decomposition | 2021-03-17 | Paper |
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY | 2021-02-15 | Paper |
My gadget just cares for me -- how NINA can prove security against combined attacks | 2020-08-05 | Paper |
Decomposition of permutations in a finite field | 2019-05-15 | Paper |
Constructions of S-boxes with uniform sharing | 2019-05-15 | Paper |
CAPA: the spirit of beaver against physical attacks | 2018-09-12 | Paper |
Masking AES with \(d+1\) shares in hardware | 2018-02-14 | Paper |
Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm | 2016-04-26 | Paper |
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties | 2016-04-19 | Paper |
Consolidating Masking Schemes | 2015-12-10 | Paper |
Threshold implementations of small S-boxes | 2015-11-18 | Paper |
Higher-Order Glitch Resistant Implementation of the PRESENT S-Box | 2015-09-21 | Paper |
Higher-Order Threshold Implementations | 2015-01-06 | Paper |
A More Efficient AES Threshold Implementation | 2014-06-24 | Paper |
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes | 2012-11-13 | Paper |
KLEIN: A New Family of Lightweight Block Ciphers | 2012-08-20 | Paper |
Secure hardware implementation of nonlinear functions in the presence of glitches | 2012-01-18 | Paper |
Public-Key Encryption with Delegated Search | 2011-06-28 | Paper |
Privacy Enhanced Access Control by Means of Policy Blinding | 2011-05-19 | Paper |
Whirlwind: a new cryptographic hash function | 2010-09-16 | Paper |
Searching Keywords with Wildcards on Encrypted Data | 2010-09-10 | Paper |
Towards Secure and Practical MACs for Body Sensor Networks | 2009-12-17 | Paper |
Strongly Multiplicative Hierarchical Threshold Secret Sharing | 2009-12-03 | Paper |
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches | 2009-03-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q3597515 | 2009-02-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3597516 | 2009-02-09 | Paper |
Classification of cubic (n-4)-resilient Boolean functions | 2008-12-21 | Paper |
On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions | 2008-12-21 | Paper |
Using Normal Bases for Compact Hardware Implementations of the AES S-Box | 2008-11-20 | Paper |
Threshold Implementations Against Side-Channel Attacks and Glitches | 2008-11-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3508962 | 2008-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3508963 | 2008-07-01 | Paper |
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols | 2008-04-24 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
Cryptography and Coding | 2007-11-28 | Paper |
Coding and Cryptography | 2007-05-02 | Paper |
Security in Communication Networks | 2006-10-10 | Paper |
Selected Areas in Cryptography | 2006-10-10 | Paper |
Computing and Combinatorics | 2006-01-11 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417422 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417425 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414276 | 2003-07-24 | Paper |
On the non-minimal codewords in binary Reed-Muller codes | 2003-06-10 | Paper |
Improvement of the Delsarte bound for \(\tau\)-designs when it is not the best bound possible | 2003-04-28 | Paper |
Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces | 2002-11-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741451 | 2001-10-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4504299 | 2000-09-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501013 | 2000-09-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945348 | 2000-06-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4954425 | 2000-06-07 | Paper |
Nonexistence of certain spherical designs of odd strengths and cardinalities | 1999-03-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q3838752 | 1998-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3838680 | 1998-08-13 | Paper |
On lower bounds on the size of designs in compact symmetric spaces of rank 1 | 1997-09-24 | Paper |