| Publication | Date of Publication | Type |
|---|
How to Strengthen the Security of RSA-OAEP IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Code-based public-key cryptosystems and their applications Lecture Notes in Computer Science | 2010-09-29 | Paper |
Very-efficient anonymous password-authenticated key exchange and its extensions Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
Efficient constructions of deterministic encryption from hybrid encryption and code-based PKE Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
Leakage-resilient authenticated key establishment protocols Lecture Notes in Computer Science | 2010-01-05 | Paper |
Advances in Cryptology - ASIACRYPT 2003 Lecture Notes in Computer Science | 2010-01-05 | Paper |
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange Public Key Infrastructure | 2009-04-23 | Paper |
Semantic security for the McEliece cryptosystem without random oracles Designs, Codes and Cryptography | 2009-03-31 | Paper |
Coding-Based Oblivious Transfer Mathematical Methods in Computer Science | 2009-01-22 | Paper |
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol Advances in Information and Computer Security | 2008-07-25 | Paper |
An Authentication and Key Exchange Protocol for Secure Credential Services Lecture Notes in Computer Science | 2008-06-17 | Paper |
On the Key-Privacy Issue of McEliece Public-Key Encryption Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA Applied Cryptography and Network Security | 2007-09-24 | Paper |
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes Lecture Notes in Computer Science | 2007-02-12 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
| scientific article; zbMATH DE number 2085434 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2081066 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 1759325 (Why is no real title available?) | 2003-02-14 | Paper |
| scientific article; zbMATH DE number 1618037 (Why is no real title available?) | 2002-07-22 | Paper |
| scientific article; zbMATH DE number 1424199 (Why is no real title available?) | 2002-03-18 | Paper |
| scientific article; zbMATH DE number 1107700 (Why is no real title available?) | 1998-06-14 | Paper |