| Publication | Date of Publication | Type |
|---|
On Catalan constant continued fractions Codes, Cryptology and Information Security | 2023-10-04 | Paper |
Pattern Recognition Experiments on Mathematical Expressions | 2022-12-21 | Paper |
A Note on the Ramanujan Machine | 2022-11-02 | Paper |
Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms | 2022-08-25 | Paper |
Reusing nonces in Schnorr signatures (and keeping it secure...) | 2022-08-25 | Paper |
Automated Discovery of New $L$-Function Relations | 2022-06-07 | Paper |
The Multiplicative Persistence Conjecture Is True for Odd Targets | 2021-10-08 | Paper |
The eleventh power residue symbol Journal of Mathematical Cryptology | 2021-05-25 | Paper |
New number-theoretic cryptographic primitives Journal of Mathematical Cryptology | 2021-05-03 | Paper |
Approaching optimal duplicate detection in a sliding window | 2021-04-21 | Paper |
Explaining the Entombed Algorithm | 2021-04-18 | Paper |
Integer Reconstruction Public-Key Encryption Cryptology and Network Security | 2020-07-20 | Paper |
Recovering secrets from prefix-dependent leakage Journal of Mathematical Cryptology | 2020-06-24 | Paper |
A Fractional $3n+1$ Conjecture | 2020-06-20 | Paper |
The Look-and-Say The Biggest Sequence Eventually Cycles | 2020-06-12 | Paper |
Stuttering Conway Sequences Are Still Conway Sequences | 2020-06-11 | Paper |
On the hardness of the Mersenne Low Hamming Ratio assumption | 2020-03-02 | Paper |
Robust encryption (extended) | 2020-01-28 | Paper |
Efficient subtree-based encryption for fuzzy-entity data sharing Soft Computing | 2018-11-27 | Paper |
\(\mathsf{xmx}\): a firmware-oriented block cipher based on modular multiplications Fast Software Encryption | 2018-05-09 | Paper |
Backtracking-assisted multiplication Cryptography and Communications | 2018-01-29 | Paper |
Honey encryption for language. Robbing Shannon to pay Turing? | 2017-10-23 | Paper |
Human public-key encryption | 2017-10-23 | Paper |
Legally Fair Contract Signing Without Keystones Applied Cryptography and Network Security | 2016-10-04 | Paper |
Practical cryptanalysis of ISO 9796-2 and EMV signatures Journal of Cryptology | 2016-09-21 | Paper |
Slow motion zero knowledge identifying with colliding commitments Information Security and Cryptology | 2016-07-25 | Paper |
Buying AES design resistance with speed and energy The New Codebreakers | 2016-05-02 | Paper |
Improving the Big Mac attack on elliptic curve cryptography The New Codebreakers | 2016-05-02 | Paper |
Photonic power firewalls The New Codebreakers | 2016-05-02 | Paper |
Double-speed Barrett moduli The New Codebreakers | 2016-05-02 | Paper |
Failure is also an option The New Codebreakers | 2016-05-02 | Paper |
How to (carefully) breach a service contract? The New Codebreakers | 2016-05-02 | Paper |
Safe-errors on SPA protected implementations with the atomicity technique The New Codebreakers | 2016-05-02 | Paper |
OMD: a compression function mode of operation for authenticated encryption Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Verifying software integrity in embedded systems: a side channel approach Constructive Side-Channel Analysis and Secure Design | 2016-03-10 | Paper |
How to sign paper contracts? Conjectures and evidence related to equitable and efficient collaborative task scheduling Open Problems in Mathematics and Computational Science | 2015-06-22 | Paper |
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption Lecture Notes in Computer Science | 2014-10-14 | Paper |
Another look at affine-padding RSA signatures Lecture Notes in Computer Science | 2013-06-04 | Paper |
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Autotomic signatures Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Operand Folding Hardware Multipliers Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
How to Read a Signature? Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Physical Simulation of Inarticulate Robots Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Can a program reverse-engineer itself? Cryptography and Coding | 2011-12-16 | Paper |
Fully homomorphic encryption over the integers with shorter public keys Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Cryptanalysis of the RSA subgroup assumption from TCC 2005 Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Factoring unbalanced moduli with known bits Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
On the broadcast and validity-checking security of \textsc{pkcs}\#1 v1.5 encryption Applied Cryptography and Network Security | 2010-07-06 | Paper |
Divisibility, smoothness and cryptographic applications | 2010-05-14 | Paper |
The polynomial composition problem in \((\mathbb Z/n\mathbb Z)[X\)] Lecture Notes in Computer Science | 2010-04-19 | Paper |
Fault attacks against EMV signatures Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Efficient rational secret sharing in standard communication networks Theory of Cryptography | 2010-02-24 | Paper |
Oracle-assisted static Diffie-Hellman is easier than discrete logarithms Cryptography and Coding | 2010-01-07 | Paper |
Comparing with RSA Cryptography and Coding | 2010-01-07 | Paper |
Boneh et al.'s \(k\)-element aggregate extraction assumption is equivalent to the Diffie-Hellman assumption Lecture Notes in Computer Science | 2010-01-05 | Paper |
Fault Attacks on RSA Signatures with Partially Unknown Messages Lecture Notes in Computer Science | 2009-11-10 | Paper |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Linear Bandwidth Naccache-Stern Encryption Lecture Notes in Computer Science | 2008-11-20 | Paper |
When e-th Roots Become Easier Than Factoring Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Cryptanalysis of ISO/IEC 9796-1 Journal of Cryptology | 2008-04-16 | Paper |
Cryptographic Test Correction Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Index calculation attacks on RSA signature and encryption Designs, Codes and Cryptography | 2006-05-29 | Paper |
New attacks on PKCS\#1 V1.5 encryption | 2006-03-01 | Paper |
Security analysis of the Gennaro-Halevi-Rabin signature scheme | 2006-03-01 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
scientific article; zbMATH DE number 2088330 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 1980953 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1950600 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1950608 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1942423 (Why is no real title available?) | 2003-06-30 | Paper |
scientific article; zbMATH DE number 1842505 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1759356 (Why is no real title available?) | 2002-11-28 | Paper |
scientific article; zbMATH DE number 1759354 (Why is no real title available?) | 2002-11-28 | Paper |
scientific article; zbMATH DE number 1759351 (Why is no real title available?) | 2002-11-28 | Paper |
scientific article; zbMATH DE number 1759295 (Why is no real title available?) | 2002-11-28 | Paper |
scientific article; zbMATH DE number 1676660 (Why is no real title available?) | 2001-11-25 | Paper |
scientific article; zbMATH DE number 1583772 (Why is no real title available?) | 2001-07-03 | Paper |
scientific article; zbMATH DE number 1504544 (Why is no real title available?) | 2000-09-12 | Paper |
scientific article; zbMATH DE number 1418283 (Why is no real title available?) | 2000-07-26 | Paper |
scientific article; zbMATH DE number 1456815 (Why is no real title available?) | 2000-06-07 | Paper |
scientific article; zbMATH DE number 1304108 (Why is no real title available?) | 2000-02-01 | Paper |
scientific article; zbMATH DE number 1341876 (Why is no real title available?) | 2000-02-01 | Paper |
scientific article; zbMATH DE number 1394294 (Why is no real title available?) | 2000-01-31 | Paper |
scientific article; zbMATH DE number 1341875 (Why is no real title available?) | 1999-09-22 | Paper |
scientific article; zbMATH DE number 1303124 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1304109 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1088905 (Why is no real title available?) | 1998-02-19 | Paper |
Can Montgomery parasites be avoided? A design methodology based on key and cryptosystem modifications Designs, Codes and Cryptography | 1995-06-20 | Paper |
scientific article; zbMATH DE number 503365 (Why is no real title available?) | 1994-03-10 | Paper |
The Balkans Continued Fraction | N/A | Paper |