Publication | Date of Publication | Type |
---|
Partial Cycle Structure of FSRs and Its Applications in Searching De Bruijn Sequences | 2024-03-14 | Paper |
Moving a step of ChaCha in syncopated rhythm | 2024-02-02 | Paper |
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls | 2023-12-08 | Paper |
Amortizing division and exponentiation | 2023-08-21 | Paper |
Generalized boomerang connectivity table and improved cryptanalysis of GIFT | 2023-08-21 | Paper |
Cryptanalysis of Ciminion | 2023-08-21 | Paper |
Higher-order masking scheme for Trivium hardware implementation | 2023-08-21 | Paper |
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP | 2023-06-30 | Paper |
Conditional Cube Searching and Applications on Trivium-Variant Ciphers | 2023-06-30 | Paper |
Properties of the cycles that contain all vectors of weight \(\le k\) | 2023-01-18 | Paper |
Two new families of quantum synchronizable codes | 2022-12-23 | Paper |
A two-round honest-verifier zero-knowledge protocol | 2022-10-28 | Paper |
Bayesian mechanism for rational secret sharing scheme | 2022-10-28 | Paper |
Generic Constructions of Revocable Identity-Based Encryption | 2022-10-14 | Paper |
Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT | 2022-07-01 | Paper |
Isomorphism and equivalence of Galois nonlinear feedback shift registers | 2022-07-01 | Paper |
Binary sequences derived from monomial permutation polynomials over \(\mathrm{GF}(2^p)\) | 2022-07-01 | Paper |
Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey | 2022-06-08 | Paper |
Differential-linear cryptanalysis from an algebraic perspective | 2022-04-22 | Paper |
Determining deep hole trees of generalized Reed-Solomon codes and an application | 2022-03-21 | Paper |
The Adjacency Graphs of FSRs With Affine Characteristic Functions | 2022-02-17 | Paper |
Efficient Construction of Cross-Join Pairs in a Product of Primitive Polynomials of Pairwise-Coprime Degrees | 2022-02-17 | Paper |
On the \(k\)-error linear complexities of De Bruijn sequences | 2021-12-08 | Paper |
On Galois NFSRs equivalent to Fibonacci ones | 2021-12-08 | Paper |
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems | 2021-11-11 | Paper |
Analyzing Boolean functions via solving parametric polynomial systems | 2021-04-08 | Paper |
Hierarchical group signatures with verifier-local revocation | 2021-01-18 | Paper |
On the efficiency of solving Boolean polynomial systems with the characteristic set method | 2020-11-13 | Paper |
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks | 2020-07-16 | Paper |
Longest subsequences shared by two de Bruijn sequences | 2020-07-15 | Paper |
A new upper bound on the order of affine sub-families of NFSRs | 2020-05-13 | Paper |
Refined analysis to the extended tower number field sieve | 2020-03-12 | Paper |
Composition of Boolean functions: an application to the secondary constructions of bent functions | 2020-01-22 | Paper |
Distribution properties of binary sequences derived from primitive sequences modulo square-free odd integers | 2019-10-31 | Paper |
A note on rotation symmetric S-boxes | 2019-10-22 | Paper |
Faster scalar multiplication on the \(x\)-line: three-dimensional GLV method with three-dimensional differential addition chains | 2019-10-14 | Paper |
A new construction of zero-difference balanced functions and two applications | 2019-09-12 | Paper |
Bounds for Binary Linear Locally Repairable Codes via a Sphere-Packing Approach | 2019-07-19 | Paper |
Further results on complete permutation monomials over finite fields | 2019-06-18 | Paper |
A recursive construction of permutation polynomials over \(\mathbb F_{q^2}\) with odd characteristic related to Rédei functions | 2019-06-06 | Paper |
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity | 2019-05-17 | Paper |
Multi-identity IBFHE and multi-attribute ABFHE in the standard model | 2019-03-29 | Paper |
Speeding up the GVW algorithm via a substituting method | 2019-03-06 | Paper |
The distribution of \(2^n\)-periodic binary sequences with fixed \(k\)-error linear complexity | 2018-12-07 | Paper |
Fault attacks on stream cipher Scream | 2018-12-07 | Paper |
Estimating differential-linear distinguishers and applications to CTC2 | 2018-12-07 | Paper |
Combined cache timing attacks and template attacks on stream cipher MUGI | 2018-12-07 | Paper |
The linear complexity and 2-error linear complexity distribution of \(2^n\)-periodic binary sequences with fixed Hamming weight | 2018-10-26 | Paper |
On the division property of \textsc{Simon}48 and \textsc{Simon}64 | 2018-10-24 | Paper |
Symbolic-like computation and conditional differential cryptanalysis of QUARK | 2018-10-24 | Paper |
Anonymous identity-based encryption with identity recovery | 2018-09-26 | Paper |
On Minimum Period of Nonlinear Feedback Shift Registers in Grain-Like Structure | 2018-09-19 | Paper |
Lower and Upper Bounds on the Density of Irreducible NFSRs | 2018-09-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4570861 | 2018-07-09 | Paper |
Correlation cube attacks: from weak-key distinguisher to key recovery | 2018-07-09 | Paper |
Improved key generation algorithm for Gentry's fully homomorphic encryption scheme | 2018-06-15 | Paper |
Refinement of the four-dimensional GLV method on elliptic curves | 2018-04-26 | Paper |
A game-based framework towards cyber-attacks on state estimation in ICSS | 2018-04-20 | Paper |
Cryptanalysis of Acorn in nonce-reuse setting | 2018-04-20 | Paper |
A class of three-weight and five-weight linear codes | 2018-04-10 | Paper |
Complete weight enumerators of a class of three-weight linear codes | 2017-11-10 | Paper |
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions | 2017-07-12 | Paper |
The Adjacency Graphs of LFSRs With Primitive-Like Characteristic Polynomials | 2017-06-08 | Paper |
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers | 2017-05-16 | Paper |
Solving polynomial systems with noise over \(\mathbb{F}_2\): revisited | 2017-05-11 | Paper |
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher | 2017-05-05 | Paper |
Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based Framework | 2017-05-05 | Paper |
Generalized Hamming Weights of Irreducible Cyclic Codes | 2017-04-28 | Paper |
Complete weight enumerators of two classes of linear codes | 2017-04-03 | Paper |
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications | 2017-03-27 | Paper |
On affine sub-families of Grain-like structures | 2017-02-17 | Paper |
The adjacency graphs of some feedback shift registers | 2017-02-17 | Paper |
A kind of three-weight linear codes | 2017-02-09 | Paper |
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers | 2017-02-01 | Paper |
Complete weight enumerators of two classes of linear codes | 2016-12-22 | Paper |
On implementing the symbolic preprocessing function over Boolean polynomial rings in Gröbner basis algorithms using linear algebra | 2016-10-20 | Paper |
Classifying and generating exact coset representatives of \(\operatorname{PGL}_2(\mathbb{F}_q)\) in \(\operatorname{PGL}_2(\mathbb{F}_{q^2})\) | 2016-10-10 | Paper |
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour | 2016-08-31 | Paper |
An improvement over the GVW algorithm for inhomogeneous polynomial systems | 2016-07-29 | Paper |
Generalized cyclotomic numbers of order two and their applications | 2016-07-01 | Paper |
Solving Linear Equations Modulo Unknown Divisors: Revisited | 2016-06-10 | Paper |
Linearization of nonlinear filter generators and its application to cryptanalysis of stream ciphers | 2016-06-03 | Paper |
Towards Optimal Bounds for Implicit Factorization Problem | 2016-05-19 | Paper |
Further results on the nonlinearity of maximum-length NFSR feedbacks | 2016-04-11 | Paper |
Linear complexity of Ding-Helleseth sequences of order 2 over \(\mathrm{GF}(l)\) | 2016-04-11 | Paper |
A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers | 2016-03-23 | Paper |
Generic constructions of integrated PKE and PEKS | 2016-02-19 | Paper |
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract) | 2016-01-11 | Paper |
A New Method for Solving Polynomial Systems with Noise over $\mathbb{F}_2$ and Its Applications in Cold Boot Key Recovery | 2015-12-04 | Paper |
Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions | 2015-12-02 | Paper |
Omega Pairing on Hyperelliptic Curves | 2015-12-02 | Paper |
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails | 2015-11-25 | Paper |
Improved domain extender for the ideal cipher | 2015-11-19 | Paper |
Near Collision Attack on the Grain v1 Stream Cipher | 2015-09-18 | Paper |
Linear complexity of binary generalized cyclotomic sequences over \(\mathrm{GF}(q)\) | 2015-08-24 | Paper |
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation | 2015-07-06 | Paper |
On constructing complete permutation polynomials over finite fields of even characteristic | 2015-04-28 | Paper |
A new linearization method for nonlinear feedback shift registers | 2015-02-20 | Paper |
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks | 2014-09-12 | Paper |
Analysis of Optimum Pairing Products at High Security Levels | 2014-08-20 | Paper |
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents | 2014-07-07 | Paper |
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme | 2014-03-05 | Paper |
Complete permutation polynomials induced from complete permutations of subfields | 2013-12-19 | Paper |
A method for counting the number of polynomial equivalence classes | 2013-09-04 | Paper |
New constructions of quaternary bent functions | 2013-09-01 | Paper |
On enumeration of polynomial equivalence classes | 2013-08-05 | Paper |
Improved bounds for the implicit factorization problem | 2013-07-31 | Paper |
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits | 2013-06-28 | Paper |
Fast Evaluation of T-Functions via Time-Memory Trade-Offs | 2013-05-28 | Paper |
Construction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks | 2013-05-28 | Paper |
On Efficient Pairings on Elliptic Curves over Extension Fields | 2013-04-04 | Paper |
An Improved Twisted Ate Pairing over KSS Curves with k = 18 | 2013-04-04 | Paper |
Stronger Security Model for Public-Key Encryption with Equality Test | 2013-04-04 | Paper |
Perfect Algebraic Immune Functions | 2013-03-19 | Paper |
Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves | 2013-01-07 | Paper |
Vladimir Sergeevich Anashin | 2012-11-13 | Paper |
Anonymous Identity-Based Hash Proof System and Its Applications | 2012-11-06 | Paper |
Identity-Based Extractable Hash Proofs and Their Applications | 2012-09-10 | Paper |
Linear Weaknesses in T-functions | 2012-09-07 | Paper |
The Initialization Stage Analysis of ZUC v1.5 | 2012-07-20 | Paper |
Ergodic theory over \(\mathbb F_2 T\) | 2012-05-07 | Paper |
On enumeration of polynomial equivalence classes and their application to MPKC | 2012-03-22 | Paper |
Efficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2 | 2011-12-16 | Paper |
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge | 2011-12-02 | Paper |
ON THE NONEXISTENCE of BENT FUNCTIONS | 2011-10-10 | Paper |
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks | 2011-07-07 | Paper |
Attacking Bivium and Trivium with the Characteristic Set Method | 2011-06-29 | Paper |
On designated-weight Boolean functions with highest algebraic immunity | 2011-02-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3062376 | 2011-01-03 | Paper |
Refinement of Miller’s Algorithm Over Edwards Curves | 2010-03-16 | Paper |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model | 2009-08-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610926 | 2009-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3611002 | 2009-03-06 | Paper |
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption | 2009-02-10 | Paper |
Unlinkable Randomizable Signature and Its Application in Group Signature | 2009-02-10 | Paper |
OPMAC: One-Key Poly1305 MAC | 2009-01-15 | Paper |
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps | 2009-01-09 | Paper |
Novel \(\Omega\)-protocols for NP | 2008-03-31 | Paper |
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability | 2007-11-29 | Paper |
Constructing parallel long-message signcryption scheme from trapdoor permutation | 2007-08-31 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
The internet accessible mathematical computation framework | 2007-02-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3411652 | 2006-12-11 | Paper |
Information Security and Cryptology | 2006-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q3365691 | 2006-01-23 | Paper |
Computational Science - ICCS 2004 | 2005-12-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4675628 | 2005-05-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4790483 | 2003-06-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4550792 | 2003-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4790474 | 2003-01-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2725951 | 2002-11-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q2747400 | 2002-07-28 | Paper |
A class of generalized cyclic codes | 2002-04-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4705548 | 1999-12-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4705599 | 1999-12-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4234210 | 1999-03-16 | Paper |
Well-behaved basis and LR arrays | 1996-07-08 | Paper |
Structure and properties of linear recurring m-arrays | 1994-10-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279023 | 1994-09-26 | Paper |
The equivalence classes of LR arrays | 1994-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q5288886 | 1993-09-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4025575 | 1993-02-18 | Paper |
Linear Recurring m-Arrays | 1988-01-01 | Paper |