| Publication | Date of Publication | Type |
|---|
VSS Made Simpler | 2024-03-14 | Paper |
Cryptologists should not ignore the history of Al-Andalusia Codes, Cryptology and Information Security | 2023-10-04 | Paper |
Computational aspects of ideal \((t, n)\)-threshold scheme of Chen, Laing, and Martin Cryptology and Network Security | 2023-08-02 | Paper |
Analytical characteristics of the DES Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2022-01-08 | Paper |
Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification Theoretical Computer Science | 2021-10-06 | Paper |
Access structure hiding secret sharing from novel set systems and vector families | 2021-04-21 | Paper |
Breaking the traditional computer security research barriers Computer Security — ESORICS 92 | 2021-04-07 | Paper |
Economically optimal variable tag length message authentication Financial Cryptography and Data Security | 2021-03-17 | Paper |
Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious-Majority and Free Verification | 2020-11-30 | Paper |
Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption Cryptology and Network Security | 2020-07-20 | Paper |
Evolving perfect hash families: a combinatorial viewpoint of evolving secret sharing Cryptology and Network Security | 2020-07-20 | Paper |
Realistic versus rational secret sharing Lecture Notes in Computer Science | 2020-07-20 | Paper |
Perfect anonymity IEEE Transactions on Information Theory | 2019-07-19 | Paper |
Dependence of output on input in DES: small avalanche characteristics Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2017-04-10 | Paper |
Private visual share-homomorphic computation and randomness reduction in visual cryptography Lecture Notes in Computer Science | 2017-01-06 | Paper |
How to share a function securely Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94 | 2016-09-01 | Paper |
Walsh transforms and cryptographic applications in bias computing Cryptography and Communications | 2016-05-04 | Paper |
What is the Future of Cryptography? The New Codebreakers | 2016-05-02 | Paper |
A subexponential construction of graph coloring for multiparty computation Journal of Mathematical Cryptology | 2015-01-22 | Paper |
Efficient Multiplicative Sharing Schemes Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Edge-colored graphs with applications to homogeneous faults Information Processing Letters | 2013-04-04 | Paper |
Graph coloring applied to secure computation in non-abelian groups Journal of Cryptology | 2013-01-04 | Paper |
Active security in multiparty computation over black-box groups Lecture Notes in Computer Science | 2012-09-25 | Paper |
Human Perfectly Secure Message Transmission Protocols and Their Applications Lecture Notes in Computer Science | 2012-09-25 | Paper |
A Brief Survey of Research Jointly with Jean-Jacques Quisquater Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Secure communication in multicast graphs Lecture Notes in Computer Science | 2011-12-02 | Paper |
Bias analysis of a certain problem with applications to E0 and Shannon cipher Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Redesigning group key exchange protocol based on bilinear pairing suitable for various environ\-ments Information Security and Cryptology | 2011-07-29 | Paper |
Pseudo-cryptanalysis of Luffa Information Security and Cryptology | 2011-07-29 | Paper |
Homogeneous faults, colored edge graphs, and cover free families Lecture Notes in Computer Science | 2011-05-19 | Paper |
Redistribution of mechanical secret shares Financial Cryptography | 2011-04-20 | Paper |
Improved distinguishing attack on Rabbit Lecture Notes in Computer Science | 2011-02-11 | Paper |
General perfectly secure message transmission using linear codes Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Cryptanalysis of secure message transmission protocols with feedback Lecture Notes in Computer Science | 2010-09-29 | Paper |
Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Bounds and constructions for key distribution schemes Advances in Mathematics of Communications | 2010-03-10 | Paper |
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack Journal of Cryptology | 2010-03-01 | Paper |
Error correcting and complexity aspects of linear secret sharing schemes Lecture Notes in Computer Science | 2010-02-09 | Paper |
A secure and scalable group key exchange system Information Processing Letters | 2009-12-04 | Paper |
Unconditionally Secure Approximate Message Authentication Lecture Notes in Computer Science | 2009-07-23 | Paper |
On Secure Multi-party Computation in Black-Box Groups Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Perfectly Secure Message Transmission Revisited IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Revisiting Pairing Based Group Key Exchange Financial Cryptography and Data Security | 2009-02-12 | Paper |
A CCA Secure Hybrid Damgård’s ElGamal Encryption Provable Security | 2009-01-27 | Paper |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption Cryptology and Network Security | 2009-01-09 | Paper |
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng Financial Cryptography and Data Security | 2008-09-09 | Paper |
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring Lecture Notes in Computer Science | 2008-06-24 | Paper |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders Lecture Notes in Computer Science | 2008-06-17 | Paper |
Secure Protocols with Asymmetric Trust Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network Information Security and Cryptology – ICISC 2006 | 2008-05-06 | Paper |
Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels Lecture Notes in Computer Science | 2008-04-17 | Paper |
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups Financial Cryptography and Data Security | 2008-03-07 | Paper |
Algorithms and Computation Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Index calculation attacks on RSA signature and encryption Designs, Codes and Cryptography | 2006-05-29 | Paper |
How to break a practical MIX and design a new one | 2006-03-01 | Paper |
Computing and Combinatorics Lecture Notes in Computer Science | 2006-01-11 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
ANALYZING VULNERABILITIES OF CRITICAL INFRASTRUCTURES USING FLOWS AND CRITICAL VERTICES IN AND/OR GRAPHS International Journal of Foundations of Computer Science | 2005-10-19 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
scientific article; zbMATH DE number 2089979 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2086727 (Why is no real title available?) | 2004-08-11 | Paper |
Secure communication in multicast channels: The answer to Franklin and Wright's question Journal of Cryptology | 2003-12-21 | Paper |
scientific article; zbMATH DE number 1952907 (Why is no real title available?) | 2003-07-24 | Paper |
scientific article; zbMATH DE number 1952757 (Why is no real title available?) | 2003-07-23 | Paper |
scientific article; zbMATH DE number 1618055 (Why is no real title available?) | 2002-05-05 | Paper |
scientific article; zbMATH DE number 1676639 (Why is no real title available?) | 2001-11-25 | Paper |
scientific article; zbMATH DE number 1588474 (Why is no real title available?) | 2001-07-13 | Paper |
scientific article; zbMATH DE number 1302809 (Why is no real title available?) | 2001-03-18 | Paper |
scientific article; zbMATH DE number 1504555 (Why is no real title available?) | 2000-09-12 | Paper |
scientific article; zbMATH DE number 1504553 (Why is no real title available?) | 2000-09-12 | Paper |
scientific article; zbMATH DE number 1501630 (Why is no real title available?) | 2000-09-04 | Paper |
Computing Functions of a Shared Secret SIAM Journal on Discrete Mathematics | 2000-07-20 | Paper |
scientific article; zbMATH DE number 697826 (Why is no real title available?) | 2000-06-21 | Paper |
scientific article; zbMATH DE number 1440075 (Why is no real title available?) | 2000-05-07 | Paper |
scientific article; zbMATH DE number 1304089 (Why is no real title available?) | 2000-03-07 | Paper |
scientific article; zbMATH DE number 1302808 (Why is no real title available?) | 1999-10-06 | Paper |
Divertible and subliminal-free zero-knowledge proofs for languages Journal of Cryptology | 1999-09-22 | Paper |
scientific article; zbMATH DE number 1303119 (Why is no real title available?) | 1999-09-09 | Paper |
scientific article; zbMATH DE number 1302811 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1304291 (Why is no real title available?) | 1999-06-17 | Paper |
A general zero-knowledge scheme Designs, Codes and Cryptography | 1998-12-28 | Paper |
scientific article; zbMATH DE number 1113955 (Why is no real title available?) | 1998-07-19 | Paper |
scientific article; zbMATH DE number 1088922 (Why is no real title available?) | 1998-01-26 | Paper |
scientific article; zbMATH DE number 1024082 (Why is no real title available?) | 1997-10-06 | Paper |
scientific article; zbMATH DE number 1023996 (Why is no real title available?) | 1997-08-10 | Paper |
scientific article; zbMATH DE number 1023994 (Why is no real title available?) | 1997-08-10 | Paper |
scientific article; zbMATH DE number 826068 (Why is no real title available?) | 1995-12-13 | Paper |
scientific article; zbMATH DE number 708831 (Why is no real title available?) | 1995-04-04 | Paper |
Homomorphic Zero-Knowledge Threshold Schemes over any Finite Abelian Group SIAM Journal on Discrete Mathematics | 1994-12-20 | Paper |
scientific article; zbMATH DE number 503324 (Why is no real title available?) | 1994-03-10 | Paper |
scientific article; zbMATH DE number 503250 (Why is no real title available?) | 1994-03-07 | Paper |
scientific article; zbMATH DE number 503249 (Why is no real title available?) | 1994-03-07 | Paper |
scientific article; zbMATH DE number 176567 (Why is no real title available?) | 1993-05-18 | Paper |
Weaknesses of Undeniable Signature Schemes Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
scientific article; zbMATH DE number 177019 (Why is no real title available?) | 1993-05-18 | Paper |
Broadcast Interactive Proofs Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
scientific article; zbMATH DE number 177018 (Why is no real title available?) | 1993-05-18 | Paper |
scientific article; zbMATH DE number 4211486 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4191562 (Why is no real title available?) | 1990-01-01 | Paper |
Remarks on soundness of proofs Electronics Letters | 1989-01-01 | Paper |
scientific article; zbMATH DE number 4072863 (Why is no real title available?) | 1988-01-01 | Paper |
Propagation Characteristics of the DES Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 1985-01-01 | Paper |
Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 1985-01-01 | Paper |
A critical analysis of the security of knapsack public-key algorithms IEEE Transactions on Information Theory | 1984-01-01 | Paper |