| Publication | Date of Publication | Type |
|---|
| Grey-box implementation of block ciphers preserving the confidentiality of their design | 2024-09-18 | Paper |
| Efficient proof composition for verifiable computation | 2022-08-25 | Paper |
JEROBOAM Fast Software Encryption | 2018-05-09 | Paper |
Code Reverse Engineering Problem for Identification Codes IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Software-only two-factor authentication secure against active servers Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
Hierarchical identities from group signatures and pseudonymous signatures The New Codebreakers | 2016-05-02 | Paper |
Towards secure two-party computation from the wire-tap channel Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
Cross-unlinkable hierarchical group signatures Public Key Infrastructures, Services and Applications | 2014-08-11 | Paper |
Fuzzy Vault for Multiple Users Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Password based key exchange protocols on elliptic curves which conceal the public parameters Applied Cryptography and Network Security | 2010-07-06 | Paper |
On physical obfuscation of cryptographic algorithms Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Private interrogation of devices via identification codes Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Another Look at Extended Private Information Retrieval Protocols Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication Information Security and Privacy | 2009-03-06 | Paper |
Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Cryptanalysis of EC-RAC, a RFID Identification Protocol Cryptology and Network Security | 2009-01-09 | Paper |
The best of both worlds: Applying secure sketches to cancelable biometrics Science of Computer Programming | 2009-01-09 | Paper |
A fuzzy sketch with trapdoor IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Noisy Cryptographic Protocols for Low-Cost RFID Tags IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function Lecture Notes in Computer Science | 2008-11-20 | Paper |
An Authentication Protocol with Encrypted Biometric Data Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Public Traceability in Traitor Tracing Schemes Lecture Notes in Computer Science | 2008-05-06 | Paper |
Extended Private Information Retrieval and Its Application in Biometrics Authentications Cryptology and Network Security | 2008-04-15 | Paper |
On the powerline system Applicable Algebra in Engineering, Communication and Computing | 2003-04-28 | Paper |
| scientific article; zbMATH DE number 1107705 (Why is no real title available?) | 1998-06-07 | Paper |
Factoring of \(x^ n -1\) and orthogonalization over finite fields of characteristic 2 Applicable Algebra in Engineering, Communication and Computing | 1995-08-28 | Paper |
The n-dimensional key equation and a decoding application IEEE Transactions on Information Theory | 1994-10-04 | Paper |
| scientific article; zbMATH DE number 493097 (Why is no real title available?) | 1994-02-02 | Paper |
On the concatenated structures of a [49,18,12 binary abelian code] Discrete Mathematics | 1993-08-30 | Paper |
Permutation decoding of abelian codes IEEE Transactions on Information Theory | 1993-02-04 | Paper |