| Publication | Date of Publication | Type |
|---|
On construction of resilient functions | 2024-07-11 | Paper |
Differential random fault attacks on certain CAESAR stream ciphers | 2020-07-08 | Paper |
How to fairly reconstruct a shared secret Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
A new key escrow cryptosystem Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Randomness measures related to subset occurrence Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
A fundamental flaw in the ++AE authenticated encryption mode Journal of Mathematical Cryptology | 2018-04-10 | Paper |
Fault attacks on XEX mode with application to certain authenticated encryption modes | 2017-08-25 | Paper |
Fast correlation attacks on nonlinear filter generators Information Processing Letters | 2016-05-26 | Paper |
Flaws in the initialisation process of stream ciphers Computation, Cryptography, and Network Security | 2016-03-04 | Paper |
BP-XACML an authorisation policy language for business processes Information Security and Privacy | 2015-10-20 | Paper |
Weaknesses in the initialisation process of the common scrambling algorithm stream cipher Sequences and Their Applications - SETA 2014 | 2015-09-09 | Paper |
Indirect message injection for MAC generation Journal of Mathematical Cryptology | 2013-11-12 | Paper |
A general model for MAC generation using direct injection Information Security and Cryptology | 2013-05-28 | Paper |
Analysis of indirect message injection for MAC generation using stream ciphers Information Security and Privacy | 2012-09-07 | Paper |
A framework for security analysis of key derivation functions Information Security Practice and Experience | 2012-06-29 | Paper |
An exploration of affine group laws for elliptic curves Journal of Mathematical Cryptology | 2011-07-11 | Paper |
State convergence in the initialisation of stream ciphers Information Security and Privacy | 2011-07-07 | Paper |
A model for constraint and delegation management Information Security Practice and Experience | 2011-05-19 | Paper |
Towards a game theoretic authorisation model Lecture Notes in Computer Science | 2010-11-23 | Paper |
Linearity within the SMS4 block cipher Information Security and Cryptology | 2010-11-23 | Paper |
Jacobi Quartic Curves Revisited Information Security and Privacy | 2009-06-25 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Identity-based strong designated verifier signature schemes: attacks and new construction Computers and Electrical Engineering | 2009-04-17 | Paper |
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Computers and Electrical Engineering | 2009-04-17 | Paper |
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks Information Security and Privacy | 2009-03-06 | Paper |
Twisted Edwards Curves Revisited Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Bit-Pattern Based Integral Attack Fast Software Encryption | 2008-09-18 | Paper |
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
New Formulae for Efficient Elliptic Curve Arithmetic Lecture Notes in Computer Science | 2008-04-11 | Paper |
An Efficient and Verifiable Solution to the Millionaire Problem Lecture Notes in Computer Science | 2008-03-17 | Paper |
Simple and Efficient Shuffling with Provable Correctness and ZK Privacy Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Rekeying Issues in the MUGI Stream Cipher Selected Areas in Cryptography | 2007-11-15 | Paper |
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction Information Security and Privacy | 2007-09-07 | Paper |
A Novel Range Test Information Security and Privacy | 2007-09-07 | Paper |
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond Information Security and Privacy | 2007-09-07 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
scientific article; zbMATH DE number 5066607 (Why is no real title available?) | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Multi-objective optimisation of bijective S-boxes New Generation Computing | 2006-06-12 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
scientific article; zbMATH DE number 2230939 (Why is no real title available?) | 2005-11-21 | Paper |
A public key cryptosystem based on a subgroup membership problem Designs, Codes and Cryptography | 2005-11-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Correlation immunity and resiliency of symmetric Boolean functions Theoretical Computer Science | 2004-10-27 | Paper |
scientific article; zbMATH DE number 2080707 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2080176 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2080179 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2048535 (Why is no real title available?) | 2004-03-01 | Paper |
scientific article; zbMATH DE number 2043310 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1996484 (Why is no real title available?) | 2003-10-22 | Paper |
scientific article; zbMATH DE number 1980956 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1950627 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1950346 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1950332 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1941234 (Why is no real title available?) | 2003-06-29 | Paper |
scientific article; zbMATH DE number 1857525 (Why is no real title available?) | 2003-05-19 | Paper |
Statistical weakness of multiplexed sequences Finite Fields and their Applications | 2003-04-02 | Paper |
scientific article; zbMATH DE number 1759278 (Why is no real title available?) | 2002-10-13 | Paper |
scientific article; zbMATH DE number 1808271 (Why is no real title available?) | 2002-09-26 | Paper |
scientific article; zbMATH DE number 1500493 (Why is no real title available?) | 2002-08-14 | Paper |
scientific article; zbMATH DE number 1500492 (Why is no real title available?) | 2002-08-14 | Paper |
scientific article; zbMATH DE number 1500487 (Why is no real title available?) | 2002-07-28 | Paper |
scientific article; zbMATH DE number 1522640 (Why is no real title available?) | 2002-06-10 | Paper |
scientific article; zbMATH DE number 1424188 (Why is no real title available?) | 2002-04-08 | Paper |
scientific article; zbMATH DE number 1689605 (Why is no real title available?) | 2002-01-13 | Paper |
scientific article; zbMATH DE number 1689010 (Why is no real title available?) | 2002-01-09 | Paper |
scientific article; zbMATH DE number 1925560 (Why is no real title available?) International Journal of Information Security | 2002-01-01 | Paper |
scientific article; zbMATH DE number 1440060 (Why is no real title available?) | 2001-10-03 | Paper |
scientific article; zbMATH DE number 1588475 (Why is no real title available?) | 2001-07-17 | Paper |
scientific article; zbMATH DE number 1612529 (Why is no real title available?) | 2001-07-01 | Paper |
scientific article; zbMATH DE number 1612508 (Why is no real title available?) | 2001-07-01 | Paper |
scientific article; zbMATH DE number 1471071 (Why is no real title available?) | 2000-07-09 | Paper |
scientific article; zbMATH DE number 1304126 (Why is no real title available?) | 2000-02-02 | Paper |
Fast correlation attacks on the summation generator. Journal of Cryptology | 2000-01-01 | Paper |
Shared secret reconstruction Designs, Codes and Cryptography | 1999-07-28 | Paper |
scientific article; zbMATH DE number 1303959 (Why is no real title available?) | 1999-06-17 | Paper |
Existence of generalized inverse of linear transformations over finite fields Finite Fields and their Applications | 1998-12-06 | Paper |
scientific article; zbMATH DE number 1189377 (Why is no real title available?) | 1998-10-08 | Paper |
scientific article; zbMATH DE number 1107685 (Why is no real title available?) | 1998-05-29 | Paper |
scientific article; zbMATH DE number 1076147 (Why is no real title available?) | 1997-10-20 | Paper |
scientific article; zbMATH DE number 1024010 (Why is no real title available?) | 1997-06-18 | Paper |
scientific article; zbMATH DE number 874210 (Why is no real title available?) | 1997-03-25 | Paper |
scientific article; zbMATH DE number 731849 (Why is no real title available?) | 1995-08-28 | Paper |
scientific article; zbMATH DE number 166085 (Why is no real title available?) | 1993-05-16 | Paper |
scientific article; zbMATH DE number 4148025 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4029438 (Why is no real title available?) | 1987-01-01 | Paper |
scientific article; zbMATH DE number 3948285 (Why is no real title available?) | 1986-01-01 | Paper |