| Publication | Date of Publication | Type |
|---|
High weight code-based signature scheme from QC-LDPC codes | 2024-05-31 | Paper |
Depth-measurement trade-off for quantum search on block ciphers Quantum Information Processing | 2024-05-30 | Paper |
A new key recovery attack on a code-based signature from the Lyubashevsky framework Information Processing Letters | 2023-10-12 | Paper |
Attack on a code-based signature scheme from QC-LDPC codes Codes, Cryptology and Information Security | 2023-10-04 | Paper |
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems Advances in Mathematics of Communications | 2023-07-07 | Paper |
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences IEEE Transactions on Information Theory | 2022-07-13 | Paper |
On existence of vectorial bent functions from the \(\mathcal{PS}_{\mathrm{ap}}\) class SCIENTIA SINICA Mathematica | 2022-03-21 | Paper |
On the design and security of Lee metric McEliece cryptosystems Designs, Codes and Cryptography | 2022-03-21 | Paper |
On the security of the modified dual-Ouroboros PKE using Gabidulin codes Applicable Algebra in Engineering, Communication and Computing | 2021-12-17 | Paper |
MURAVE: a new rank code-based signature with multiple rank verification | 2021-01-26 | Paper |
An answer to an open problem of Mesnager on bent functions Information Processing Letters | 2020-08-04 | Paper |
Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem | 2020-05-27 | Paper |
Key recovery attacks on some rank metric code-based signatures | 2020-05-06 | Paper |
Cryptanalysis of a rank-based signature with short public keys Designs, Codes and Cryptography | 2020-03-27 | Paper |
New rank codes based encryption scheme using partial circulant matrices Designs, Codes and Cryptography | 2019-11-07 | Paper |
A new Gabidulin-like code and its application in cryptography | 2019-10-14 | Paper |
On the near prime-order MNT curves Applicable Algebra in Engineering, Communication and Computing | 2019-05-16 | Paper |
Key recovery attack on McNie based on low rank parity check codes and its reparation | 2018-10-24 | Paper |
On the security and key generation of the ZHFE encryption scheme | 2018-10-24 | Paper |
A new encryption scheme based on rank metric codes | 2018-09-26 | Paper |
Orthogonal MDS diffusion matrices over Galois rings | 2018-04-20 | Paper |
On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\) Designs, Codes and Cryptography | 2018-01-26 | Paper |
Generating complete Edwards curves | 2017-08-25 | Paper |
A new block cipher based on chaotic tent maps IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications | 2017-08-25 | Paper |
New secondary constructions of differentially 4-uniform permutations over \(\mathbb F_{2^{2k}}\) International Journal of Computer Mathematics | 2017-07-28 | Paper |
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Improved Miller’s Algorithm for Computing Pairings on Edwards Curves IEEE Transactions on Computers | 2017-06-20 | Paper |
Constructing Differentially 4-Uniform Permutations Over <formula formulatype="inline"><tex Notation="TeX">${\BBF}_{2^{2k}}$</tex> </formula> via the Switching Method IEEE Transactions on Information Theory | 2017-06-08 | Paper |
New differentially 4-uniform permutations by modifying the inverse function on subfields Cryptography and Communications | 2017-02-09 | Paper |
Implicit Quadratic Property of Differentially 4-Uniform Permutations Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences Discrete Applied Mathematics | 2016-11-02 | Paper |
On the second-order nonlinearity of the hidden weighted bit function Discrete Applied Mathematics | 2016-10-07 | Paper |
A secure variant of Yasuda, Takagi and Sakurai's signature scheme Information Security and Cryptology | 2016-07-25 | Paper |
A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\) Science China. Mathematics | 2016-07-19 | Paper |
Further refinements of Miller's algorithm on Edwards curves Applicable Algebra in Engineering, Communication and Computing | 2016-06-29 | Paper |
New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\) Finite Fields and their Applications | 2016-05-19 | Paper |
MI-T-HFE, a new multivariate signature scheme Cryptography and Coding | 2016-01-12 | Paper |
Breaking an ID-based encryption based on discrete logarithm and factorization problems Information Processing Letters | 2015-12-01 | Paper |
A family of cryptographically significant Boolean functions based on the hidden weighted bit function Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
On near prime-order elliptic curves with small embedding degrees Algebraic Informatics | 2015-09-22 | Paper |
Algebraic cryptanalysis of Yasuda, Takagi and Sakurai's signature scheme Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
Properties of a family of cryptographic Boolean functions Sequences and Their Applications - SETA 2014 | 2015-09-09 | Paper |
A construction of Boolean functions with good cryptographic properties International Journal of Computer Mathematics | 2015-06-24 | Paper |
Concatenations of the hidden weighted bit function and their cryptographic properties Advances in Mathematics of Communications | 2014-11-28 | Paper |
Six Constructions of Difference Families | 2014-11-13 | Paper |
Cryptographic properties of the hidden weighted bit function Discrete Applied Mathematics | 2014-08-22 | Paper |
A new method to construct Boolean functions with good cryptographic properties Information Processing Letters | 2014-04-11 | Paper |
On double exponentiation for securing RSA against fault analysis Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity Discrete Applied Mathematics | 2014-03-27 | Paper |
On a class of quadratic polynomials with no zeros and its application to APN functions Finite Fields and their Applications | 2014-02-05 | Paper |
Identity based identification from algebraic coding theory Theoretical Computer Science | 2014-01-13 | Paper |
On the Fourier spectra of new APN functions SIAM Journal on Discrete Mathematics | 2013-09-26 | Paper |
Speeding up Ate pairing computation in affine coordinates Lecture Notes in Computer Science | 2013-06-04 | Paper |
What is your ``birthday elliptic curve? Finite Fields and their Applications | 2012-11-27 | Paper |
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions Information Processing Letters | 2012-10-23 | Paper |
New families of differentially 4-uniform permutations over \({\mathbb F}_{2^{2k}}\) Lecture Notes in Computer Science | 2012-09-07 | Paper |
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Binomial differentially 4 uniform permutations with high nonlinearity Finite Fields and their Applications | 2012-05-07 | Paper |
Improved precomputation scheme for scalar multiplication on elliptic curves Cryptography and Coding | 2011-12-16 | Paper |
Certificateless cryptography with KGC trust level 3 Theoretical Computer Science | 2011-10-10 | Paper |
Certificateless public key encryption: a new generic construction and two pairing-free schemes Theoretical Computer Science | 2011-02-21 | Paper |
Dynamic group key exchange revisited Cryptology and Network Security | 2010-12-07 | Paper |
Probabilistic public key encryption with equality test Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Analysis of improved signcryption scheme with key privacy Information Processing Letters | 2010-01-29 | Paper |
Secure public-key encryption scheme without random oracles Information Sciences | 2008-09-05 | Paper |
scientific article; zbMATH DE number 2043341 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1808279 (Why is no real title available?) | 2002-09-26 | Paper |
scientific article; zbMATH DE number 1740054 (Why is no real title available?) | 2002-05-14 | Paper |