| Publication | Date of Publication | Type |
|---|
| Computing Möbius transforms of Boolean functions and characterising coincident Boolean functions | 2024-09-18 | Paper |
| Möbius-\(\alpha\) commutative functions and partially coincident functions | 2024-09-18 | Paper |
| An algebraic analysis of Trivium ciphers based on the Boolean satisfiability problem | 2024-09-18 | Paper |
| Cryptography based on transcendental numbers | 2024-07-11 | Paper |
| Cryptosystems for hierarchical groups | 2024-07-11 | Paper |
| On selectable collisionful hash functions | 2024-07-11 | Paper |
| On password-based authenticated key exchange using collisionful hash functions | 2024-07-11 | Paper |
Spatial encryption revisited: from delegatable multiple inner product encryption and more Computer Security – ESORICS 2022 | 2023-07-21 | Paper |
Resource-saving quantum key distribution based on three-photon matrix product states Quantum Information Processing | 2023-06-13 | Paper |
Analysis of weighted quantum secret sharing based on matrix product states Quantum Information Processing | 2023-02-16 | Paper |
High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels Quantum Information Processing | 2023-01-13 | Paper |
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption 1522.68187 | 2022-12-22 | Paper |
An improved quantum network communication model based on compressed tensor network states Quantum Information Processing | 2022-12-06 | Paper |
Dynamic and compressed quantum many-body state secret sharing based on site-independent matrix product states Quantum Information Processing | 2022-11-29 | Paper |
| Dynamic searchable symmetric encryption with forward and stronger backward privacy | 2022-08-25 | Paper |
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security (available as arXiv preprint) | 2022-08-25 | Paper |
Novel quantum key distribution with shift operations based on Fibonacci and Lucas valued orbital angular momentum entangled states Physica A | 2022-05-17 | Paper |
Two types of dynamic quantum state secret sharing based on tensor networks states Physica A | 2022-03-01 | Paper |
Lattice blind signatures with forward security (available as arXiv preprint) | 2021-06-08 | Paper |
Trapdoor delegation and HIBE from middle-product LWE in standard model (available as arXiv preprint) | 2021-02-23 | Paper |
Keyed hash functions Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Signcryption schemes with insider security in an ideal permutation model Journal of Mathematical Cryptology | 2019-07-08 | Paper |
Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphers Cryptography and Communications | 2019-03-22 | Paper |
An improved coding method of quantum key distribution protocols based on Fibonacci-valued OAM entangled states Physics Letters. A | 2018-12-21 | Paper |
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement Quantum Information Processing | 2018-11-05 | Paper |
Tunable multi-party high-capacity quantum key distribution based on \(m\)-generalized Fibonacci sequences using Golden coding Quantum Information Processing | 2018-10-29 | Paper |
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice Information Processing Letters | 2018-04-04 | Paper |
Controllable quantum private queries using an entangled Fibonacci-sequence spiral source Physics Letters. A | 2017-05-19 | Paper |
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding Quantum Information Processing | 2017-03-06 | Paper |
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Rotational cryptanalysis of round-reduced \textsc{Keccak} Fast Software Encryption | 2015-09-18 | Paper |
Rotational cryptanalysis of ARX revisited Fast Software Encryption | 2015-09-18 | Paper |
ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption Advanced Information Systems Engineering | 2015-07-21 | Paper |
Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model Nonlinear Dynamics | 2015-07-09 | Paper |
Dynamic \((2, 3)\) threshold quantum secret sharing of secure direct communication Communications in Theoretical Physics | 2015-05-20 | Paper |
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes Quantum Information Processing | 2015-04-13 | Paper |
A subexponential construction of graph coloring for multiparty computation Journal of Mathematical Cryptology | 2015-01-22 | Paper |
Low probability differentials and the cryptanalysis of full-round CLEFIA-128 Lecture Notes in Computer Science | 2015-01-16 | Paper |
An ideal and robust threshold RSA Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Practical attack on NLM-MAC scheme Information Processing Letters | 2014-06-23 | Paper |
The resistance of PRESENT-80 against related-key differential attacks Cryptography and Communications | 2014-06-20 | Paper |
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes Quantum Information Processing | 2014-06-13 | Paper |
Lattice-based completely non-malleable public-key encryption in the standard model Designs, Codes and Cryptography | 2014-04-29 | Paper |
Security analysis of linearly filtered NLFSRs Journal of Mathematical Cryptology | 2014-01-23 | Paper |
Cryptanalysis of WG-7: a lightweight stream cipher Cryptography and Communications | 2013-06-24 | Paper |
New security notions and relations for public-key encryption Journal of Mathematical Cryptology | 2013-01-17 | Paper |
On the (in)security of IDEA in various hashing modes Fast Software Encryption | 2013-01-08 | Paper |
Graph coloring applied to secure computation in non-abelian groups Journal of Cryptology | 2013-01-04 | Paper |
Active security in multiparty computation over black-box groups Lecture Notes in Computer Science | 2012-09-25 | Paper |
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Multi-party computation with conversion of secret sharing Designs, Codes and Cryptography | 2012-03-01 | Paper |
Known and Chosen Key Differential Distinguishers for Block Ciphers Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster) Information Security and Privacy | 2011-07-07 | Paper |
Möbius transforms, coincident Boolean functions and non-coincidence property of Boolean functions International Journal of Computer Mathematics | 2011-06-15 | Paper |
Parallel signcryption Practical Signcryption | 2011-05-18 | Paper |
Decomposition construction for secret sharing schemes with graph access structures in polynomial time SIAM Journal on Discrete Mathematics | 2011-04-15 | Paper |
Cryptanalysis of the Convex Hull Click Human Identification Protocol Lecture Notes in Computer Science | 2011-02-11 | Paper |
A New Human Identification Protocol and Coppersmith’s Baby-Step Giant-Step Algorithm Applied Cryptography and Network Security | 2010-07-06 | Paper |
Efficient one-time proxy signatures Lecture Notes in Computer Science | 2010-01-05 | Paper |
Universal designated-verifier signatures Lecture Notes in Computer Science | 2010-01-05 | Paper |
Extensions of the Cube Attack Based on Low Degree Annihilators Cryptology and Network Security | 2009-11-26 | Paper |
Cryptanalysis of the LAKE Hash Family Fast Software Encryption | 2009-08-11 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Unconditionally secure disjointness tests for private datasets International Journal of Applied Cryptography | 2009-05-12 | Paper |
Multi-Party Computation with Omnipresent Adversary Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
On Secure Multi-party Computation in Black-Box Groups Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
A Critical Look at Cryptographic Hash Function Literature Coding and Cryptology | 2009-03-09 | Paper |
An Improved Distinguisher for Dragon Coding and Cryptology | 2009-03-09 | Paper |
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures Information Security and Cryptology | 2009-02-10 | Paper |
Lattice-based treshold-changeability for standard CRT secret-sharing schemes Finite Fields and their Applications | 2009-02-09 | Paper |
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups Cryptology and Network Security | 2009-01-09 | Paper |
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
The eight variable homogeneous degree three bent functions Journal of Discrete Algorithms | 2008-11-18 | Paper |
Cryptanalysis of LASH Fast Software Encryption | 2008-09-18 | Paper |
Cryptanalysis of FORK-256 Fast Software Encryption | 2008-09-16 | Paper |
Efficient Disjointness Tests for Private Datasets Information Security and Privacy | 2008-07-08 | Paper |
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 Lecture Notes in Computer Science | 2008-06-24 | Paper |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders Lecture Notes in Computer Science | 2008-06-17 | Paper |
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels Provable Security | 2008-06-10 | Paper |
On Algebraic Immunity and Annihilators Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
On the Provable Security of an Efficient RSA-Based Pseudorandom Generator Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Permutation polynomials of the \((x^p - x+\delta)^s+L(x)\) Finite Fields and their Applications | 2008-04-22 | Paper |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature Lecture Notes in Computer Science | 2008-04-17 | Paper |
A New Dynamic Accumulator for Batch Updates Information and Communications Security | 2008-03-25 | Paper |
Threshold Privacy Preserving Keyword Searches SOFSEM 2008: Theory and Practice of Computer Science | 2008-03-07 | Paper |
Crossword Puzzle Attack on NLS Selected Areas in Cryptography | 2007-11-29 | Paper |
Distinguishing Attack on SOBER-128 with Linear Masking Information Security and Privacy | 2007-09-07 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
New constructions of anonymous membership broadcasting schemes Advances in Mathematics of Communications | 2007-04-05 | Paper |
Generalised cumulative arrays in secret sharing Designs, Codes and Cryptography | 2006-11-22 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
| Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes | 2005-08-12 | Paper |
| scientific article; zbMATH DE number 2159653 (Why is no real title available?) | 2005-04-20 | Paper |
| scientific article; zbMATH DE number 2159653 (Why is no real title available?) | 2005-04-20 | Paper |
| scientific article; zbMATH DE number 2159640 (Why is no real title available?) | 2005-04-20 | Paper |
| scientific article; zbMATH DE number 2159640 (Why is no real title available?) | 2005-04-20 | Paper |
| scientific article; zbMATH DE number 2127879 (Why is no real title available?) | 2005-01-14 | Paper |
Homogeneous bent functions of degree \(n\) in 2\(n\) variables do not exist for \(n>3\) Discrete Applied Mathematics | 2004-08-19 | Paper |
| scientific article; zbMATH DE number 2089971 (Why is no real title available?) | 2004-08-12 | Paper |
Shared generation of pseudo-random functions Journal of Complexity | 2004-08-06 | Paper |
| scientific article; zbMATH DE number 2080685 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2048538 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2043337 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1942820 (Why is no real title available?) | 2003-10-26 | Paper |
| scientific article; zbMATH DE number 1980983 (Why is no real title available?) | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1962157 (Why is no real title available?) | 2003-08-10 | Paper |
Homogeneous bent functions Discrete Applied Mathematics | 2003-08-06 | Paper |
| scientific article; zbMATH DE number 1955792 (Why is no real title available?) | 2003-07-29 | Paper |
| scientific article; zbMATH DE number 1950616 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950336 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950617 (Why is no real title available?) | 2003-07-17 | Paper |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1857516 (Why is no real title available?) | 2003-05-19 | Paper |
| scientific article; zbMATH DE number 1759656 (Why is no real title available?) | 2002-11-23 | Paper |
| scientific article; zbMATH DE number 1808275 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1500490 (Why is no real title available?) | 2002-07-28 | Paper |
| scientific article; zbMATH DE number 1759653 (Why is no real title available?) | 2002-06-25 | Paper |
| scientific article; zbMATH DE number 1731748 (Why is no real title available?) | 2002-04-22 | Paper |
| scientific article; zbMATH DE number 1717241 (Why is no real title available?) | 2002-03-07 | Paper |
| scientific article; zbMATH DE number 1440047 (Why is no real title available?) | 2001-08-20 | Paper |
| scientific article; zbMATH DE number 1612522 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1583941 (Why is no real title available?) | 2001-04-03 | Paper |
| scientific article; zbMATH DE number 1556752 (Why is no real title available?) | 2001-04-02 | Paper |
Remarks on the multiple assignment secret sharing scheme Information and Communications Security | 2001-04-01 | Paper |
| scientific article; zbMATH DE number 1543053 (Why is no real title available?) | 2001-02-26 | Paper |
| scientific article; zbMATH DE number 1543036 (Why is no real title available?) | 2001-02-26 | Paper |
| scientific article; zbMATH DE number 1487952 (Why is no real title available?) | 2000-08-10 | Paper |
| scientific article; zbMATH DE number 1424185 (Why is no real title available?) | 2000-03-23 | Paper |
| scientific article; zbMATH DE number 1360745 (Why is no real title available?) | 1999-11-10 | Paper |
| scientific article; zbMATH DE number 1303961 (Why is no real title available?) | 1999-09-09 | Paper |
| scientific article; zbMATH DE number 1303966 (Why is no real title available?) | 1999-07-11 | Paper |
| scientific article; zbMATH DE number 1303964 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303970 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303958 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1189397 (Why is no real title available?) | 1998-10-08 | Paper |
| scientific article; zbMATH DE number 1189396 (Why is no real title available?) | 1998-08-13 | Paper |
A multi-level view model for secure object-oriented databases Data & Knowledge Engineering | 1998-07-22 | Paper |
Secret sharing in hierarchical groups Information and Communications Security | 1998-02-16 | Paper |
| Rotation-symmetric functions and fast hashing | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1024006 (Why is no real title available?) | 1997-08-26 | Paper |
| scientific article; zbMATH DE number 1024001 (Why is no real title available?) | 1997-07-20 | Paper |
Attacking the SL 2 hashing scheme Advances in Cryptology — ASIACRYPT'94 | 1997-06-18 | Paper |
| scientific article; zbMATH DE number 697804 (Why is no real title available?) | 1995-02-19 | Paper |
| scientific article; zbMATH DE number 426131 (Why is no real title available?) | 1995-01-23 | Paper |
| scientific article; zbMATH DE number 697799 (Why is no real title available?) | 1995-01-08 | Paper |
| scientific article; zbMATH DE number 697815 (Why is no real title available?) | 1995-01-08 | Paper |
| scientific article; zbMATH DE number 503344 (Why is no real title available?) | 1994-12-04 | Paper |
| scientific article; zbMATH DE number 697806 (Why is no real title available?) | 1994-11-30 | Paper |
| scientific article; zbMATH DE number 697812 (Why is no real title available?) | 1994-11-30 | Paper |
| scientific article; zbMATH DE number 697814 (Why is no real title available?) | 1994-11-30 | Paper |
Design of hashing algorithms Lecture Notes in Computer Science | 1993-12-08 | Paper |
| scientific article; zbMATH DE number 177608 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177611 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177622 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177029 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 48626 (Why is no real title available?) | 1992-09-17 | Paper |
Permutation generators of alternating groups Advances in Cryptology — AUSCRYPT '90 | 1992-06-26 | Paper |
| scientific article; zbMATH DE number 4195885 (Why is no real title available?) | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 3937111 (Why is no real title available?) | 1985-01-01 | Paper |
Algebraical Structures of Cryptographic Transformations Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 1985-01-01 | Paper |
| scientific article; zbMATH DE number 3716776 (Why is no real title available?) | 1979-01-01 | Paper |