Publication | Date of Publication | Type |
---|
Cryptologists should not ignore the history of Al-Andalusia | 2023-10-04 | Paper |
Computational aspects of ideal \((t, n)\)-threshold scheme of Chen, Laing, and Martin | 2023-08-02 | Paper |
Analytical Characteristics of the DES | 2022-01-08 | Paper |
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification | 2021-10-06 | Paper |
Access structure hiding secret sharing from novel set systems and vector families | 2021-04-21 | Paper |
Breaking the traditional computer security research barriers | 2021-04-07 | Paper |
Economically Optimal Variable Tag Length Message Authentication | 2021-03-17 | Paper |
Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification | 2020-11-30 | Paper |
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption | 2020-07-20 | Paper |
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing | 2020-07-20 | Paper |
Realistic versus Rational Secret Sharing | 2020-07-20 | Paper |
Perfect Anonymity | 2019-07-19 | Paper |
Dependence of output on input in DES: Small avalanche characteristics | 2017-04-10 | Paper |
Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography | 2017-01-06 | Paper |
How to share a function securely | 2016-09-01 | Paper |
Walsh transforms and cryptographic applications in bias computing | 2016-05-04 | Paper |
What is the Future of Cryptography? | 2016-05-02 | Paper |
A subexponential construction of graph coloring for multiparty computation | 2015-01-22 | Paper |
Efficient Multiplicative Sharing Schemes | 2014-08-20 | Paper |
Edge-colored graphs with applications to homogeneous faults | 2013-04-04 | Paper |
Graph coloring applied to secure computation in non-abelian groups | 2013-01-04 | Paper |
Active Security in Multiparty Computation over Black-Box Groups | 2012-09-25 | Paper |
Human Perfectly Secure Message Transmission Protocols and Their Applications | 2012-09-25 | Paper |
A Brief Survey of Research Jointly with Jean-Jacques Quisquater | 2012-06-08 | Paper |
Secure Communication in Multicast Graphs | 2011-12-02 | Paper |
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher | 2011-10-27 | Paper |
Pseudo-Cryptanalysis of Luffa | 2011-07-29 | Paper |
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments | 2011-07-29 | Paper |
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families | 2011-05-19 | Paper |
Redistribution of Mechanical Secret Shares | 2011-04-20 | Paper |
Improved Distinguishing Attack on Rabbit | 2011-02-11 | Paper |
General Perfectly Secure Message Transmission Using Linear Codes | 2010-12-07 | Paper |
Cryptanalysis of Secure Message Transmission Protocols with Feedback | 2010-09-29 | Paper |
Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes | 2010-05-04 | Paper |
Bounds and constructions for key distribution schemes | 2010-03-10 | Paper |
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack | 2010-03-01 | Paper |
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes | 2010-02-09 | Paper |
A secure and scalable group key exchange system | 2009-12-04 | Paper |
Unconditionally Secure Approximate Message Authentication | 2009-07-23 | Paper |
On Secure Multi-party Computation in Black-Box Groups | 2009-03-10 | Paper |
Perfectly Secure Message Transmission Revisited | 2009-02-24 | Paper |
Revisiting Pairing Based Group Key Exchange | 2009-02-12 | Paper |
A CCA Secure Hybrid Damgård’s ElGamal Encryption | 2009-01-27 | Paper |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption | 2009-01-09 | Paper |
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng | 2008-09-09 | Paper |
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring | 2008-06-24 | Paper |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders | 2008-06-17 | Paper |
Secure Protocols with Asymmetric Trust | 2008-05-15 | Paper |
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network | 2008-05-06 | Paper |
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels | 2008-04-17 | Paper |
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups | 2008-03-07 | Paper |
Algorithms and Computation | 2006-11-14 | Paper |
Information Security | 2006-10-20 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Index calculation attacks on RSA signature and encryption | 2006-05-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374937 | 2006-03-01 | Paper |
Computing and Combinatorics | 2006-01-11 | Paper |
Selected Areas in Cryptography | 2005-12-27 | Paper |
ANALYZING VULNERABILITIES OF CRITICAL INFRASTRUCTURES USING FLOWS AND CRITICAL VERTICES IN AND/OR GRAPHS | 2005-10-19 | Paper |
Advanced Encryption Standard – AES | 2005-09-14 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4808644 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737267 | 2004-08-11 | Paper |
Secure communication in multicast channels: The answer to Franklin and Wright's question | 2003-12-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414289 | 2003-07-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4414199 | 2003-07-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724601 | 2002-05-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757239 | 2001-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2708621 | 2001-07-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249283 | 2001-03-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502504 | 2000-09-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502506 | 2000-09-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4500377 | 2000-09-04 | Paper |
Computing Functions of a Shared Secret | 2000-07-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314043 | 2000-06-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950066 | 2000-05-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250780 | 2000-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249281 | 1999-10-06 | Paper |
Divertible and subliminal-free zero-knowledge proofs for languages | 1999-09-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249634 | 1999-09-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249285 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251016 | 1999-06-17 | Paper |
A general zero-knowledge scheme | 1998-12-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4375724 | 1998-07-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365747 | 1998-01-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341776 | 1997-10-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341667 | 1997-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341669 | 1997-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4858454 | 1995-12-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4318723 | 1995-04-04 | Paper |
Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group | 1994-12-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279657 | 1994-03-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279572 | 1994-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279573 | 1994-03-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4035739 | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4036854 | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4036855 | 1993-05-18 | Paper |
Broadcast Interactive Proofs | 1993-05-18 | Paper |
Weaknesses of Undeniable Signature Schemes | 1993-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q3211251 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3358225 | 1990-01-01 | Paper |
Remarks on soundness of proofs | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3804605 | 1988-01-01 | Paper |
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme | 1985-01-01 | Paper |
Propagation Characteristics of the DES | 1985-01-01 | Paper |
A critical analysis of the security of knapsack public-key algorithms | 1984-01-01 | Paper |