| Publication | Date of Publication | Type |
|---|
scientific article; zbMATH DE number 7802911 (Why is no real title available?) | 2024-02-10 | Paper |
Function-Dependent Commitments for Verifiable Multi-party Computation Developments in Language Theory | 2023-06-30 | Paper |
CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case Information Security Practice and Experience | 2023-06-30 | Paper |
On lattice-based interactive protocols: an approach with less or no aborts | 2021-06-08 | Paper |
Sustainable cryptography International Symposium on Mathematics, Quantum Theory, and Cryptography | 2021-02-25 | Paper |
\textsf{BLAZE}: practical lattice-based blind signatures for privacy-preserving applications | 2021-02-08 | Paper |
Differential power analysis of XMSS and SPHINCS Constructive Side-Channel Analysis and Secure Design | 2020-07-20 | Paper |
Function-dependent commitments from homomorphic authenticators | 2020-05-27 | Paper |
Context hiding multi-key linearly homomorphic authenticators | 2020-01-28 | Paper |
Efficient proactive secret sharing for large data via concise vector commitments | 2019-10-14 | Paper |
Estimation of the hardness of the learning with errors problem with a restricted number of samples Journal of Mathematical Cryptology | 2019-05-21 | Paper |
\(\mathsf{ELSA}\): efficient long-term secure storage of large datasets | 2019-03-29 | Paper |
Long-term secure time-stamping using preimage-aware hash functions (short version) | 2018-11-07 | Paper |
Revisiting TESLA in the quantum random oracle model | 2018-09-12 | Paper |
Performing computations on hierarchically shared secrets | 2018-07-17 | Paper |
Recovering short generators of principal fractional ideals in cyclotomic fields of conductor \(p^\alpha q^\beta\) | 2018-04-26 | Paper |
A linearly homomorphic signature scheme from weaker assumptions | 2018-04-20 | Paper |
Long-term secure commitments via extractable-binding commitments | 2017-08-25 | Paper |
On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge International Journal of Information and Coding Theory | 2017-07-26 | Paper |
Linearly homomorphic authenticated encryption with provable correctness and public verifiability Codes, Cryptology and Information Security | 2017-06-01 | Paper |
Dynamic and verifiable hierarchical secret sharing Lecture Notes in Computer Science | 2017-01-06 | Paper |
Password requirements markup language Information Security and Privacy | 2016-08-31 | Paper |
Homomorphic signature schemes. A survey SpringerBriefs in Computer Science | 2016-08-04 | Paper |
An efficient lattice-based signature scheme with provably secure instantiation Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
Introduction to cryptography Springer-Lehrbuch | 2016-05-20 | Paper |
Post-quantum cryptography: state of the art The New Codebreakers | 2016-05-02 | Paper |
Forward secure signatures on smart cards Selected Areas in Cryptography | 2015-12-04 | Paper |
Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Improvement and efficient implementation of a lattice-based signature scheme Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Augmented Learning with Errors: The Untapped Potential of the Error Term Financial Cryptography and Data Security | 2015-09-29 | Paper |
On the security of long-lived archiving systems based on the evidence record syntax Lecture Notes in Computer Science | 2015-09-21 | Paper |
Nearest planes in practice Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
Tuning GaussSieve for speed Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Mutant differential fault analysis of Trivium MDFA Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
On the efficiency of provably secure NTRU Post-Quantum Cryptography | 2015-01-14 | Paper |
Full analysis of \textsc{PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures Designs, Codes and Cryptography | 2014-09-04 | Paper |
Towards lattice based aggregate signatures Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Long term confidentiality: a survey Designs, Codes and Cryptography | 2014-04-29 | Paper |
Introduction to public key infrastructures | 2013-12-06 | Paper |
On the security of the Winternitz one-time signature scheme International Journal of Applied Cryptography | 2013-11-15 | Paper |
Minkowski, Hermite, and the internet Mitteilungen der Deutschen Mathematiker-Vereinigung (DMV) | 2013-10-22 | Paper |
A multivariate based threshold ring signature scheme Applicable Algebra in Engineering, Communication and Computing | 2013-09-30 | Paper |
Fast verification for improved versions of the UOV and rainbow signature schemes Post-Quantum Cryptography | 2013-06-14 | Paper |
Cryptanalysis of hash-based tamed transformation and minus signature scheme Post-Quantum Cryptography | 2013-06-14 | Paper |
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC Information Security and Cryptology | 2013-05-28 | Paper |
Many weak keys for PRINTcipher: fast key recovery and countermeasures Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
On the design of hardware building blocks for modern lattice-based encryption schemes Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48 Cryptology and Network Security | 2012-07-20 | Paper |
Post-quantum cryptography: lattice identification schemes Publicationes Mathematicae Debrecen | 2012-07-12 | Paper |
XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions Post-Quantum Cryptography | 2011-11-25 | Paper |
On the security of the Winternitz one-time signature scheme Lecture Notes in Computer Science | 2011-06-29 | Paper |
Computing a lattice basis from a system of generating vectors Lecture Notes in Computer Science | 2011-04-16 | Paper |
Linear recurring sequences for the UOV key generation Public Key Cryptography – PKC 2011 | 2011-03-15 | Paper |
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems Cryptology and Network Security | 2010-12-07 | Paper |
Towards provable security of the unbalanced oil and vinegar signature scheme under direct attacks Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Introduction to cryptography Springer-Lehrbuch | 2010-11-17 | Paper |
MXL\(_3\): an efficient algorithm for computing Gröbner bases of zero-dimensional ideals Information, Security and Cryptology – ICISC 2009 | 2010-07-16 | Paper |
Selecting parameters for the Rainbow signature scheme Post-Quantum Cryptography | 2010-06-17 | Paper |
Parallel shortest lattice vector enumeration on graphics cards Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Flexible partial enlargement to accelerate Gröbner basis computation over \(\mathbb{F}_2\) Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Secure parameters for SWIFFT Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Algebraic Attack on the MQQ Public Key Cryptosystem Cryptology and Network Security | 2009-11-26 | Paper |
Post-quantum cryptography: lattice signatures Computing | 2009-08-10 | Paper |
A Multipurpose Delegation Proxy for WWW Credentials Public Key Infrastructure | 2009-04-23 | Paper |
A Zero-Dimensional Gröbner Basis for AES-128 Fast Software Encryption | 2009-04-02 | Paper |
Hash-based Digital Signature Schemes Post-Quantum Cryptography | 2009-03-12 | Paper |
Merkle Signatures with Virtually Unlimited Signature Capacity Applied Cryptography and Network Security | 2009-03-10 | Paper |
Public Key Authentication with Memory Tokens Information Security Applications | 2009-02-24 | Paper |
Explicit Hard Instances of the Shortest Vector Problem Post-Quantum Cryptography | 2008-11-11 | Paper |
MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy Post-Quantum Cryptography | 2008-11-11 | Paper |
Merkle Tree Traversal Revisited Post-Quantum Cryptography | 2008-11-11 | Paper |
Einführung in die Kryptographie Springer-Lehrbuch | 2008-04-14 | Paper |
CMSS – An Improved Merkle Signature Scheme Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
A Terr algorithm for computations in the infrastructure of real-quadratic number fields Journal de Théorie des Nombres de Bordeaux | 2007-09-04 | Paper |
Algorithmic Number Theory Lecture Notes in Computer Science | 2007-05-02 | Paper |
Binary quadratic forms. An algorithmic approach Algorithms and Computation in Mathematics | 2007-03-22 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Computing the structure of a finite abelian group Mathematics of Computation | 2005-09-08 | Paper |
scientific article; zbMATH DE number 2154276 (Why is no real title available?) | 2005-04-08 | Paper |
scientific article; zbMATH DE number 2107168 (Why is no real title available?) | 2004-10-12 | Paper |
scientific article; zbMATH DE number 2107169 (Why is no real title available?) | 2004-10-12 | Paper |
scientific article; zbMATH DE number 1978496 (Why is no real title available?) | 2003-09-09 | Paper |
A signature scheme based on the intractability of computing roots Designs, Codes and Cryptography | 2003-03-19 | Paper |
scientific article; zbMATH DE number 1759644 (Why is no real title available?) | 2002-11-24 | Paper |
A survey on IQ cryptography | 2002-04-21 | Paper |
scientific article; zbMATH DE number 1583945 (Why is no real title available?) | 2001-12-16 | Paper |
Cryptography based on number fields with large regulator Journal de Théorie des Nombres de Bordeaux | 2001-07-30 | Paper |
scientific article; zbMATH DE number 1589545 (Why is no real title available?) | 2001-04-19 | Paper |
scientific article; zbMATH DE number 1520570 (Why is no real title available?) | 2000-10-23 | Paper |
scientific article; zbMATH DE number 1516550 (Why is no real title available?) | 2000-10-11 | Paper |
scientific article; zbMATH DE number 1461529 (Why is no real title available?) | 2000-06-20 | Paper |
scientific article; zbMATH DE number 1406767 (Why is no real title available?) | 2000-03-01 | Paper |
scientific article; zbMATH DE number 1356718 (Why is no real title available?) | 1999-11-02 | Paper |
scientific article; zbMATH DE number 1346526 (Why is no real title available?) | 1999-10-03 | Paper |
scientific article; zbMATH DE number 1302464 (Why is no real title available?) | 1999-08-31 | Paper |
scientific article; zbMATH DE number 1273657 (Why is no real title available?) | 1999-07-20 | Paper |
scientific article; zbMATH DE number 1257081 (Why is no real title available?) | 1999-07-07 | Paper |
On factor refinement in number fields Mathematics of Computation | 1998-12-03 | Paper |
scientific article; zbMATH DE number 1088248 (Why is no real title available?) | 1998-06-07 | Paper |
On some computational problems in finite abelian groups Mathematics of Computation | 1997-12-16 | Paper |
scientific article; zbMATH DE number 1024053 (Why is no real title available?) | 1997-07-20 | Paper |
Constructing nonresidues in finite fields and the extended Riemann hypothesis Mathematics of Computation | 1996-12-03 | Paper |
On smooth ideals in number fields Journal of Number Theory | 1996-11-10 | Paper |
scientific article; zbMATH DE number 733559 (Why is no real title available?) | 1996-06-25 | Paper |
scientific article; zbMATH DE number 799775 (Why is no real title available?) | 1996-03-31 | Paper |
scientific article; zbMATH DE number 784878 (Why is no real title available?) | 1996-03-17 | Paper |
Approximating rings of integers in number fields Journal de Théorie des Nombres de Bordeaux | 1995-12-19 | Paper |
scientific article; zbMATH DE number 802334 (Why is no real title available?) | 1995-10-04 | Paper |
A Practical Version of the Generalized Lagrange Algorithm Experimental Mathematics | 1995-06-20 | Paper |
scientific article; zbMATH DE number 503350 (Why is no real title available?) | 1994-12-04 | Paper |
A key-exchange protocol using real quadratic fields Journal of Cryptology | 1994-09-26 | Paper |
On Unit Groups and Class Groups of Quartic Fields of Signature (2, 1) Mathematics of Computation | 1994-06-05 | Paper |
scientific article; zbMATH DE number 503246 (Why is no real title available?) | 1994-03-07 | Paper |
scientific article; zbMATH DE number 177026 (Why is no real title available?) | 1993-05-18 | Paper |
scientific article; zbMATH DE number 16712 (Why is no real title available?) | 1992-06-26 | Paper |
Some remarks concerning the complexity of computing class groups of quadratic fields Journal of Complexity | 1992-06-26 | Paper |
scientific article; zbMATH DE number 4208157 (Why is no real title available?) | 1991-01-01 | Paper |
scientific article; zbMATH DE number 4200333 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4168790 (Why is no real title available?) | 1990-01-01 | Paper |
p-Adic Computation of Real Quadratic Class Numbers Mathematics of Computation | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4173143 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4191104 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4215364 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4183508 (Why is no real title available?) | 1990-01-01 | Paper |
On the Computation of Unit Groups and Class Groups of Totally Real Quartic Fields | 1989-01-01 | Paper |
Computation of Independent Units in Number Fields by Dirichlet's Method Mathematics of Computation | 1989-01-01 | Paper |
scientific article; zbMATH DE number 4137898 (Why is no real title available?) | 1989-01-01 | Paper |
scientific article; zbMATH DE number 4148210 (Why is no real title available?) | 1989-01-01 | Paper |
On the Computation of the Class Number of an Algebraic Number Field | 1989-01-01 | Paper |
On the Infrastructure of the Principal Ideal Class of an Algebraic Number Field of Unit Rank One | 1988-01-01 | Paper |
A key-exchange system based on imaginary quadratic fields Journal of Cryptology | 1988-01-01 | Paper |
Leopoldt's Conjecture in Parameterized Families Proceedings of the American Mathematical Society | 1988-01-01 | Paper |
On the computation of units and class numbers by a generalization of Lagrange's algorithm Journal of Number Theory | 1987-01-01 | Paper |
The Computation of the Fundamental Unit of Totally Complex Quartic Orders | 1987-01-01 | Paper |
On the period length of the generalized Lagrange algorithm Journal of Number Theory | 1987-01-01 | Paper |
On Principal Ideal Testing in Totally Complex Quartic Fields and the Determination of Certain Cyclotomic Constants | 1987-01-01 | Paper |
An algorithm for testing Leopoldt's conjecture Journal of Number Theory | 1987-01-01 | Paper |
On principal ideal testing in algebraic number fields Journal of Symbolic Computation | 1987-01-01 | Paper |
scientific article; zbMATH DE number 3961764 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 4017034 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3918492 (Why is no real title available?) | 1985-01-01 | Paper |
The generalized Voronoi-algorithm in totally real algebraic number fields | 1985-01-01 | Paper |
Abschätzung der Periodenlänge einer verallgemeinerten Kettenbruchentwicklung. Journal für die reine und angewandte Mathematik (Crelles Journal) | 1985-01-01 | Paper |
scientific article; zbMATH DE number 3871498 (Why is no real title available?) | 1984-01-01 | Paper |