| Publication | Date of Publication | Type |
|---|
A new hardware architecture for operations in GF(2/sup n/) IEEE Transactions on Computers | 2018-07-09 | Paper |
Provable security for 13 round Skipjack-like structure Information Processing Letters | 2016-06-16 | Paper |
Global avalanche characteristics and nonlinearity of balanced Boolean functions Information Processing Letters | 2016-06-09 | Paper |
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
Simultaneous quantum transmission and teleportation of unknown photons using intra- and inter-particle entanglement controlled-NOT gates via cross-Kerr nonlinearity and P-homodyne measurements International Journal of Theoretical Physics | 2015-08-11 | Paper |
Quantum signature scheme using a single qubit rotation operator International Journal of Theoretical Physics | 2015-04-29 | Paper |
Comment on ``Quantum signature scheme with weak arbitrator International Journal of Theoretical Physics | 2014-09-30 | Paper |
A Weak Key Class of XTEA for a Related-Key Rectangle Attack Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
On the construction of quaternion fields Communications of the Korean Mathematical Society | 2013-10-24 | Paper |
A fast and provably secure higher-order masking of AES S-box Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
A new bit-serial multiplier over \(GF(pm)\) using irreducible trinomials Computers & Mathematics with Applications | 2010-11-08 | Paper |
Weakness in a RSA-based password authenticated key exchange protocol Information Processing Letters | 2010-06-09 | Paper |
Impossible differential cryptanalysis using matrix method Discrete Mathematics | 2010-04-27 | Paper |
Designated verification of non-invertible watermark Lecture Notes in Computer Science | 2010-02-09 | Paper |
Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Further Security Analysis of XTR Information Security Practice and Experience | 2009-04-02 | Paper |
Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices Information Security Practice and Experience | 2009-04-02 | Paper |
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 Information Security and Privacy | 2009-03-06 | Paper |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields Cryptology and Network Security | 2009-01-09 | Paper |
On comparison and analysis of algorithms for multiplication in \(\mathrm{GF}(2^m)\) Journal of Computer and System Sciences | 2008-12-21 | Paper |
HIGHT: A New Block Cipher Suitable for Low-Resource Device Lecture Notes in Computer Science | 2008-08-29 | Paper |
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA Lecture Notes in Computer Science | 2008-03-17 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism Selected Areas in Cryptography | 2007-11-15 | Paper |
Arbitrated quantum signature scheme with message recovery Physics Letters. A | 2007-10-08 | Paper |
Known-IV, known-in-Advance-IV, and replayed-and-Known-IV attacks on multiple modes of operation of block ciphers Journal of Cryptology | 2007-01-24 | Paper |
Efficient normal basis multipliers in composite fields IEEE Transactions on Computers | 2007-01-09 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
scientific article; zbMATH DE number 2089130 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2089315 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2089126 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2086707 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2085440 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2085439 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2081067 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2048528 (Why is no real title available?) | 2004-03-01 | Paper |
scientific article; zbMATH DE number 1980982 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1951611 (Why is no real title available?) | 2003-07-21 | Paper |
scientific article; zbMATH DE number 1951623 (Why is no real title available?) | 2003-07-21 | Paper |
scientific article; zbMATH DE number 1950358 (Why is no real title available?) | 2003-07-17 | Paper |
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1759647 (Why is no real title available?) | 2003-01-20 | Paper |
scientific article; zbMATH DE number 1759276 (Why is no real title available?) | 2002-10-13 | Paper |
scientific article; zbMATH DE number 1759641 (Why is no real title available?) | 2002-10-10 | Paper |
scientific article; zbMATH DE number 1759654 (Why is no real title available?) | 2002-10-10 | Paper |
scientific article; zbMATH DE number 1689602 (Why is no real title available?) | 2002-01-13 | Paper |
scientific article; zbMATH DE number 1341863 (Why is no real title available?) | 2001-07-23 | Paper |
scientific article; zbMATH DE number 1583951 (Why is no real title available?) | 2001-07-05 | Paper |
scientific article; zbMATH DE number 1583785 (Why is no real title available?) | 2001-07-03 | Paper |
scientific article; zbMATH DE number 1612499 (Why is no real title available?) | 2001-07-01 | Paper |
scientific article; zbMATH DE number 1457433 (Why is no real title available?) | 2000-06-12 | Paper |
scientific article; zbMATH DE number 3961788 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3991645 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3937286 (Why is no real title available?) | 1985-01-01 | Paper |