| Publication | Date of Publication | Type |
|---|
Lattice-Based Proof of a Shuffle Financial Cryptography and Data Security | 2023-08-03 | Paper |
How to challenge and cast your e-vote Financial Cryptography and Data Security | 2021-04-07 | Paper |
RLWE-based zero-knowledge proofs for linear and multiplicative relations | 2020-05-06 | Paper |
The kernel matrix Diffie-Hellman assumption Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
On dynamic distribution of private keys over MANETs Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
Ad-hoc threshold broadcast encryption with shorter ciphertexts Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
Revocable attribute-based signatures with adaptive security in the standard model Lecture Notes in Computer Science | 2011-06-29 | Paper |
Extensions of access structures and their cryptographic applications Applicable Algebra in Engineering, Communication and Computing | 2010-08-23 | Paper |
Easy verifiable primitives and practical public key cryptosystems Lecture Notes in Computer Science | 2010-02-09 | Paper |
scientific article; zbMATH DE number 5556018 (Why is no real title available?) | 2009-05-22 | Paper |
The Security of All Bits Using List Decoding Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts Provable Security | 2008-06-10 | Paper |
Cryptographic techniques for mobile ad-hoc networks Computer Networks | 2007-11-30 | Paper |
Comments on "Line digraph iterations and connectivity analysis of de Bruijn and Kautz graphs" IEEE Transactions on Computers | 2003-11-02 | Paper |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
Linear broadcast encryption schemes Discrete Applied Mathematics | 2003-06-10 | Paper |
Linear key predistribution schemes Designs, Codes and Cryptography | 2003-03-19 | Paper |
Weighted threshold secret sharing schemes Information Processing Letters | 2002-07-25 | Paper |
Linear broadcast encryption schemes | 2001-10-14 | Paper |
Computing the order of points on an elliptic curve modulo \(N\) is as difficult as factoring \(N\) Applied Mathematics Letters | 2001-08-07 | Paper |
Fault-Tolerant Fixed Routings in Some Families of Digraphs SIAM Journal on Discrete Mathematics | 1998-09-21 | Paper |
Diameter-vulnerability of large bipartite digraphs Discrete Applied Mathematics | 1996-11-21 | Paper |
Diameter vulnerability of iterated line digraphs Discrete Mathematics | 1996-03-25 | Paper |
scientific article; zbMATH DE number 4168704 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4108811 (Why is no real title available?) | 1989-01-01 | Paper |
scientific article; zbMATH DE number 4059299 (Why is no real title available?) | 1988-01-01 | Paper |
scientific article; zbMATH DE number 4057538 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 4004216 (Why is no real title available?) | 1985-01-01 | Paper |
scientific article; zbMATH DE number 3966106 (Why is no real title available?) | 1985-01-01 | Paper |
scientific article; zbMATH DE number 3948333 (Why is no real title available?) | 1985-01-01 | Paper |