| Publication | Date of Publication | Type |
|---|
| Improved algorithm to find equations for algebraic attacks for combiners with memory | 2024-09-18 | Paper |
(Finite) field work: choosing the best encoding of numbers for FHE computation Cryptology and Network Security | 2023-08-02 | Paper |
| Unsupervised Machine Learning on encrypted data | 2019-02-20 | Paper |
Accelerating homomorphic computations on rational numbers Applied Cryptography and Network Security | 2016-10-04 | Paper |
Towards a Unified Security Model for Physically Unclonable Functions Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
On lightweight stream ciphers with shorter internal states Fast Software Encryption | 2015-09-18 | Paper |
On increasing the throughput of stream ciphers Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
General impossibility of group homomorphic encryption in the quantum world Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Group homomorphic encryption: characterizations, impossibility results, and applications Designs, Codes and Cryptography | 2013-04-03 | Paper |
Shift-type homomorphic encryption and its application to fully homomorphic encryption Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
On constructing homomorphic encryption schemes from coding theory Cryptography and Coding | 2011-12-16 | Paper |
The preimage security of double-block-length compression functions Lecture Notes in Computer Science | 2011-12-02 | Paper |
Using the inhomogeneous simultaneous approximation problem for cryptographic design Lecture Notes in Computer Science | 2011-06-29 | Paper |
On the Minimum Communication Effort for Secure Group Key Exchange Selected Areas in Cryptography | 2011-03-15 | Paper |
Algebraic attacks on stream ciphers with Gröbner bases Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
Memory leakage-resilient encryption based on physically unclonable functions Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort Lecture Notes in Computer Science | 2008-11-20 | Paper |
Design Principles for Combiners with Memory Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Fault Attacks on Combiners with Memory Selected Areas in Cryptography | 2007-11-15 | Paper |
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity Automata, Languages and Programming | 2007-09-11 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |