| Publication | Date of Publication | Type |
|---|
Constructing Orientable Sequences IEEE Transactions on Information Theory | 2022-07-13 | Paper |
Minimal weight \(k\)-SR representations Cryptography and Coding | 2018-03-21 | Paper |
On the Security of 2-Key Triple DES IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Another look at privacy threats in 3G mobile telephony Information Security and Privacy | 2014-07-24 | Paper |
Analysing the IOBC authenticated encryption mode Information Security and Privacy | 2013-06-28 | Paper |
Single sign-on using trusted platforms Lecture Notes in Computer Science | 2010-02-09 | Paper |
Cryptanalysis of the EPBC Authenticated Encryption Mode Cryptography and Coding | 2008-03-07 | Paper |
Malicious attacks on ad hoc network routing protocols | 2008-03-06 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2007-11-28 | Paper |
ID-based cryptography using symmetric primitives Designs, Codes and Cryptography | 2007-09-20 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Partial key recovery attack against RMAC Journal of Cryptology | 2006-08-14 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
scientific article; zbMATH DE number 2123733 (Why is no real title available?) | 2004-12-22 | Paper |
scientific article; zbMATH DE number 2043326 (Why is no real title available?) | 2004-02-16 | Paper |
Improvement of modified authenticated key agreement protocol Applied Mathematics and Computation | 2003-07-30 | Paper |
scientific article; zbMATH DE number 1927320 (Why is no real title available?) | 2003-06-12 | Paper |
Analysis of 3gpp-MAC and two-key 3gpp-MAC Discrete Applied Mathematics | 2003-06-10 | Paper |
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs Cryptography and Coding | 2002-12-02 | Paper |
Undetachable Threshold Signatures Cryptography and Coding | 2002-11-25 | Paper |
scientific article; zbMATH DE number 1808246 (Why is no real title available?) | 2002-09-26 | Paper |
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation Cryptography and Coding | 2002-08-21 | Paper |
scientific article; zbMATH DE number 1500489 (Why is no real title available?) | 2002-08-05 | Paper |
scientific article; zbMATH DE number 1759778 (Why is no real title available?) | 2002-07-28 | Paper |
scientific article; zbMATH DE number 1759649 (Why is no real title available?) | 2002-06-25 | Paper |
An analysis of the 3gpp-MAC scheme | 2001-10-14 | Paper |
scientific article; zbMATH DE number 1504788 (Why is no real title available?) | 2000-11-07 | Paper |
On integer-valued rational polynomials and depth distributions of binary codes IEEE Transactions on Information Theory | 1999-11-21 | Paper |
Perfect Factors from Cyclic Codes and Interleaving SIAM Journal on Discrete Mathematics | 1998-05-11 | Paper |
scientific article; zbMATH DE number 1107716 (Why is no real title available?) | 1998-01-21 | Paper |
De Bruijn Sequences and Perfect Factors SIAM Journal on Discrete Mathematics | 1997-05-26 | Paper |
On the existence of de Bruijn tori with two by two windows Journal of Combinatorial Theory. Series A | 1996-12-16 | Paper |
Redundant integer representations and fast exponentiation Designs, Codes and Cryptography | 1996-12-12 | Paper |
A method for constructing decodable de Bruijn sequences IEEE Transactions on Information Theory | 1996-10-22 | Paper |
Aperiodic and semi-periodic perfect maps IEEE Transactions on Information Theory | 1996-06-03 | Paper |
Constructing \(c\)-ary perfect factors Designs, Codes and Cryptography | 1995-03-05 | Paper |
Perfect binary arrays and difference sets Discrete Mathematics | 1994-11-27 | Paper |
Decoding perfect maps Designs, Codes and Cryptography | 1994-08-24 | Paper |
The Combinatorics of Perfect Authentication Schemes SIAM Journal on Discrete Mathematics | 1994-04-19 | Paper |
Enumerating Boolean functions of cryptographic significance Journal of Cryptology | 1990-01-01 | Paper |
Key-minimal cryptosystems for unconditional secrecy Journal of Cryptology | 1990-01-01 | Paper |
Infinite families of quasiperfect and doubly quasiperfect binary arrays Electronics Letters | 1990-01-01 | Paper |
Minimum weight modified signed-digit representations and fast exponentiation Electronics Letters | 1989-01-01 | Paper |
One-stage one-sided rearrangeable switching networks IEEE Transactions on Communications | 1989-01-01 | Paper |
Key storage in secure networks Discrete Applied Mathematics | 1988-01-01 | Paper |
scientific article; zbMATH DE number 4060971 (Why is no real title available?) | 1988-01-01 | Paper |
Permutations with Restricted Displacement SIAM Journal on Algebraic Discrete Methods | 1987-01-01 | Paper |
scientific article; zbMATH DE number 3884180 (Why is no real title available?) | 1984-01-01 | Paper |