| Publication | Date of Publication | Type |
|---|
Polynomial hashing over prime order fields Advances in Mathematics of Communications | 2024-12-03 | Paper |
Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support Cryptography and Communications | 2024-11-26 | Paper |
Concrete time/memory trade-offs in generalised Stern's ISD algorithm | 2024-10-23 | Paper |
Correlation and inequality in weighted majority voting games | 2024-09-11 | Paper |
Concrete analysis of approximate ideal-SIVP to decision ring-LWE reduction Advances in Mathematics of Communications | 2024-08-06 | Paper |
New correlation bound and construction of quasi-complementary sequence sets IEEE Transactions on Information Theory | 2024-07-22 | Paper |
Computing square roots faster than the Tonelli-Shanks/Bernstein algorithm Advances in Mathematics of Communications | 2023-12-14 | Paper |
Another look at key randomisation hypotheses Designs, Codes and Cryptography | 2023-11-20 | Paper |
Notes on the postulate of the monotonicity in distance in inequality Bulletin of Economic Research | 2023-10-17 | Paper |
Influence of a Set of Variables on a Boolean Function SIAM Journal on Discrete Mathematics | 2023-09-27 | Paper |
Distinguishing error of nonlinear invariant attacks Lecture Notes in Computer Science | 2023-08-14 | Paper |
Combining Montgomery multiplication with tag tracing for the Pollard rho algorithm in prime order fields Security, Privacy, and Applied Cryptography Engineering | 2023-08-04 | Paper |
New perspectives on the Gini and Bonferroni indices of inequality Social Choice and Welfare | 2023-07-11 | Paper |
Classical reduction of gap SVP to LWE: a concrete security analysis Advances in Mathematics of Communications | 2023-07-07 | Paper |
A direct construction of even length ZCPs with large ZCZ ratio Cryptography and Communications | 2023-06-20 | Paper |
Counting unate and balanced monotone Boolean functions | 2023-04-27 | Paper |
Kummer versus Montgomery Face-off over Prime Order Fields ACM Transactions on Mathematical Software | 2023-03-22 | Paper |
On the ``majority is least stable conjecture Information Processing Letters | 2022-10-28 | Paper |
Efficient arithmetic in (pseudo-)Mersenne prime order fields Advances in Mathematics of Communications | 2022-10-18 | Paper |
Efficient 4-Way Vectorizations of the Montgomery Ladder IEEE Transactions on Computers | 2022-08-05 | Paper |
Inequality minimising subsidy and taxation Economic Theory Bulletin | 2022-07-27 | Paper |
Separation results for Boolean function classes Cryptography and Communications | 2022-03-30 | Paper |
\textsf{FAST}: disk encryption and beyond Advances in Mathematics of Communications | 2022-01-24 | Paper |
An inequality paradox: relative versus absolute indices? Metron | 2021-12-16 | Paper |
Breaking tweakable enciphering schemes using Simon's algorithm Designs, Codes and Cryptography | 2021-08-02 | Paper |
Verifying solutions to LWE with implications for concrete security Advances in Mathematics of Communications | 2021-05-12 | Paper |
Variants of Wegman-Carter message authentication code supporting variable tag lengths Designs, Codes and Cryptography | 2021-05-10 | Paper |
Weighted voting procedure having a unique blocker International Journal of Game Theory | 2021-04-27 | Paper |
Simpson's Paradox: A Singularity of Statistical and Inductive Inference | 2021-03-31 | Paper |
Kummer for genus one over prime-order fields Journal of Cryptology | 2020-03-03 | Paper |
Faster initial splitting for small characteristic composite extension degree fields Finite Fields and their Applications | 2020-02-26 | Paper |
Another look at success probability of linear cryptanalysis Advances in Mathematics of Communications | 2019-09-19 | Paper |
A Direct Construction of Z-Complementary Pairs Using Generalized Boolean Functions | 2019-07-31 | Paper |
A Direct Construction of Optimal ZCCS With Maximum Column Sequence PMEPR Two for MC-CDMA System | 2019-07-02 | Paper |
Evaluating Bernstein-Rabin-Winograd polynomials Designs, Codes and Cryptography | 2019-02-20 | Paper |
Connecting Legendre with Kummer and Edwards Advances in Mathematics of Communications | 2019-02-15 | Paper |
Multiple (truncated) differential cryptanalysis: explicit upper bounds on data complexity Cryptography and Communications | 2018-08-28 | Paper |
Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses Cryptography and Communications | 2018-05-28 | Paper |
Kummer for genus one over prime order fields | 2018-03-08 | Paper |
Rigorous upper bounds on data complexities of block cipher cryptanalysis Journal of Mathematical Cryptology | 2017-11-06 | Paper |
A new test statistic for key recovery attacks using multiple linear approximations | 2017-10-23 | Paper |
Another look at tightness. II: Practical issues in cryptography | 2017-10-23 | Paper |
Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash Functions IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Computing Partial Walsh Transform From the Algebraic Normal Form of a Boolean Function IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Pseudo-Random Functions and Parallelizable Modes of Operations of a Block Cipher IEEE Transactions on Information Theory | 2017-07-27 | Paper |
On Quantifying the Resistance of Concrete Hash Functions to Generic Multicollision Attacks IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Efficient hardware implementations of brw polynomials and tweakable enciphering schemes IEEE Transactions on Computers | 2017-07-12 | Paper |
Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme IEEE Transactions on Computers | 2017-06-20 | Paper |
Reducing Communication Overhead of the Subset Difference Scheme IEEE Transactions on Computers | 2017-05-16 | Paper |
<monospace>STES</monospace>: A Stream Cipher Based Low Cost Scheme for Securing Stored Data IEEE Transactions on Computers | 2017-05-16 | Paper |
Efficient Adaptively Secure IBBE From the SXDH Assumption IEEE Transactions on Information Theory | 2017-04-28 | Paper |
New complexity trade-offs for the (multiple) number field sieve algorithm in non-prime fields Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
On modes of operations of a block cipher for authentication and authenticated encryption Cryptography and Communications | 2016-07-01 | Paper |
A note on the spectral characterization of correlation immune Boolean functions Information Processing Letters | 2016-06-16 | Paper |
Another look at normal approximations in cryptanalysis Journal of Mathematical Cryptology | 2016-06-09 | Paper |
On Irreducible Polynomials of the Form $b(x^d)$ | 2016-04-28 | Paper |
Another look at XCB Cryptography and Communications | 2015-11-19 | Paper |
Efficient (anonymous) compact HIBE from standard assumptions Provable Security | 2015-09-29 | Paper |
Some randomness experiments on TRIVIUM Security, Privacy, and Applied Cryptography Engineering | 2015-09-18 | Paper |
Tree based symmetric key broadcast encryption Journal of Discrete Algorithms | 2015-08-24 | Paper |
A course on cooperative game theory | 2014-11-20 | Paper |
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector Cryptography and Communications | 2014-06-20 | Paper |
On some connections between statistics and cryptology Journal of Statistical Planning and Inference | 2014-03-13 | Paper |
Anonymous constant-size ciphertext HIBE from asymmetric pairings Cryptography and Coding | 2014-01-17 | Paper |
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption International Journal of Applied Cryptography | 2013-11-15 | Paper |
A new multi-linear universal hash family Designs, Codes and Cryptography | 2013-09-24 | Paper |
Tweakable enciphering schemes using only the encryption function of a block cipher Information Processing Letters | 2013-04-04 | Paper |
Complete tree subset difference broadcast encryption scheme and its analysis Designs, Codes and Cryptography | 2013-01-28 | Paper |
Variants of Waters' dual system primitives using asymmetric pairings. (Extended abstract) Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Another look at tightness Selected Areas in Cryptography | 2012-06-08 | Paper |
Identity-based encryption | 2011-04-07 | Paper |
A trade-off between collision probability and key size in universal hashing using polynomials Designs, Codes and Cryptography | 2011-04-06 | Paper |
A general mixing strategy for the ECB-Mix-ECB mode of operation Information Processing Letters | 2010-06-09 | Paper |
PARSHA-256 -- a new parallelizable hash function and a multithreaded implementation. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Parallelizing explicit formula for arithmetic in the Jacobian of hyperelliptic curves Lecture Notes in Computer Science | 2010-01-05 | Paper |
Construction of high degree resilient S-boxes with improved nonlinearity Information Processing Letters | 2009-12-04 | Paper |
Minimal-axiom characterizations of the Coleman and Banzhaf indices of voting power Mathematical Social Sciences | 2009-11-17 | Paper |
A combinatorial analysis of recent attacks on step reduced SHA-2 family Cryptography and Communications | 2009-10-26 | Paper |
Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration Discrete Applied Mathematics | 2009-06-30 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation Fast Software Encryption | 2009-04-02 | Paper |
Identity-based encryption and hierarchical identity-based encryption | 2009-03-24 | Paper |
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach IEEE Transactions on Information Theory | 2009-02-24 | Paper |
A General Construction of Tweakable Block Ciphers and Different Modes of Operations IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Pairing Computation on Twisted Edwards Form Elliptic Curves Pairing-Based Cryptography – Pairing 2008 | 2009-02-10 | Paper |
Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
New Collision Attacks against Up to 24-Step SHA-2 Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
A General Construction of Tweakable Block Ciphers and Different Modes of Operations Information Security and Cryptology | 2009-01-15 | Paper |
Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Masking-Based Domain Extenders for UOWHFs: Bounds and Constructions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Improved construction of nonlinear resilient S-boxes | 2008-12-21 | Paper |
Toward a General Correlation Theorem IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family Lecture Notes in Computer Science | 2008-11-20 | Paper |
Non-linear Reduced Round Attacks against SHA-2 Hash Family Information Security and Privacy | 2008-07-08 | Paper |
Attacking Reduced Round SHA-256 Applied Cryptography and Network Security | 2008-06-13 | Paper |
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks Provable Security | 2008-06-10 | Paper |
Generic Attacks on Symmetric Ciphers Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
New Constructions of Constant Size Ciphertext HIBE Without Random Oracle Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
HIBE With Short Public Parameters Without Random Oracle Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
New Applications of Time Memory Data Tradeoffs Lecture Notes in Computer Science | 2008-03-18 | Paper |
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields Lecture Notes in Computer Science | 2008-03-17 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Improved Time-Memory Trade-Offs with Multiple Data Selected Areas in Cryptography | 2007-11-15 | Paper |
Balancedness and correlation immunity of symmetric Boolean functions Discrete Mathematics | 2007-09-21 | Paper |
Construction of universal one-way hash functions: tree hashing revisited Discrete Applied Mathematics | 2007-09-21 | Paper |
Computing Walsh Transform from the Algebraic Normal Form of a Boolean Function Electronic Notes in Discrete Mathematics | 2007-05-29 | Paper |
Balancedness and Correlation Immunity of Symmetric Boolean Functions Electronic Notes in Discrete Mathematics | 2007-05-29 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Construction of nonlinear Boolean functions with important cryptographic properties | 2006-03-01 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Masking Based Domain Extenders for UOWHFs: Bounds and Constructions | 2005-08-12 | Paper |
Time-Memory Trade-Off Attacks on Multiplications and T-Functions | 2005-08-12 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Maximum nonlinearity of symmetric Boolean functions on odd number of variables IEEE Transactions on Information Theory | 2005-05-11 | Paper |
An efficient algorithm for software generation of binary linear recurrences Applicable Algebra in Engineering, Communication and Computing | 2005-02-09 | Paper |
A characterization and some properties of the Banzhaf-Coleman-Dubey-Shapley sensitivity index Games and Economic Behavior | 2004-11-19 | Paper |
Construction of symmetric balanced squares with blocksize more than one Designs, Codes and Cryptography | 2003-11-10 | Paper |
Improved Construction of Nonlinear Resilient S-Boxes Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1942442 (Why is no real title available?) | 2003-06-30 | Paper |
scientific article; zbMATH DE number 1857520 (Why is no real title available?) | 2003-05-19 | Paper |
Computing shifts in 90/150 cellular automata sequences Finite Fields and their Applications | 2003-05-04 | Paper |
scientific article; zbMATH DE number 1885950 (Why is no real title available?) | 2003-03-19 | Paper |
scientific article; zbMATH DE number 1878340 (Why is no real title available?) | 2003-03-09 | Paper |
scientific article; zbMATH DE number 1857512 (Why is no real title available?) | 2003-01-29 | Paper |
scientific article; zbMATH DE number 1759799 (Why is no real title available?) | 2002-10-07 | Paper |
Modifications of Patterson-Wiedemann functions for cryptographic applications IEEE Transactions on Information Theory | 2002-08-04 | Paper |
Hamming weights of correlation immune Boolean functions Information Processing Letters | 2002-07-25 | Paper |
Cryptographically significant Boolean functions with five valued Walsh spectra Theoretical Computer Science | 2002-07-15 | Paper |
Spectral domain analysis of correlation immune and resilient Boolean functions Finite Fields and their Applications | 2002-07-04 | Paper |
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes Theory of Computing Systems | 2002-05-30 | Paper |
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity | 2001-10-14 | Paper |
scientific article; zbMATH DE number 1583948 (Why is no real title available?) | 2001-09-03 | Paper |
Ciphertext Only Attack on LFSR Based Encryption Scheme Calcutta Statistical Association Bulletin | 2000-11-14 | Paper |
scientific article; zbMATH DE number 1303957 (Why is no real title available?) | 1999-06-17 | Paper |
Construction of Nearly Balanced Uniform Repeated Measurement Designs Calcutta Statistical Association Bulletin | 1999-04-26 | Paper |
scientific article; zbMATH DE number 1418296 (Why is no real title available?) | 1999-01-01 | Paper |
Polynomial division using left shift register Computers & Mathematics with Applications | 1998-08-20 | Paper |
Multidimensional \(\sigma\)-automata, \(\pi\)-polynomials and generalised S-matrices Theoretical Computer Science | 1998-08-13 | Paper |
The set of reversible \(90/150\) cellular automata is regular Discrete Applied Mathematics | 1998-07-28 | Paper |
scientific article; zbMATH DE number 1098621 (Why is no real title available?) | 1997-12-18 | Paper |
New Correlation Bound and Construction of Quasi-Complementary Code Sets | N/A | Paper |