| Publication | Date of Publication | Type |
|---|
Nested fifth root radical identities from elliptic curves Journal of Computational Algebra | 2026-01-20 | Paper |
Fibonacci-related formulas for Pi The Mathematical Intelligencer | 2025-08-28 | Paper |
Fibonacci and pi squared The Fibonacci Quarterly | 2024-04-24 | Paper |
A generalized attack on the multi-prime power RSA Progress in Cryptology - AFRICACRYPT 2022 | 2023-06-02 | Paper |
A new attack on some RSA variants Theoretical Computer Science | 2023-05-19 | Paper |
| Broadcast Authenticated Encryption with Keyword Search | 2023-04-13 | Paper |
| On the linear space of the two-sided generalized Fibonacci sequences | 2023-04-06 | Paper |
| Cryptanalysis of RSA variants with primes sharing most significant bits | 2022-07-13 | Paper |
Closed form expressions for two harmonic continued fractions The Mathematical Gazette | 2021-11-18 | Paper |
A Wiener-type attack on an RSA-like cryptosystem constructed from cubic Pell equations Theoretical Computer Science | 2021-09-06 | Paper |
| Generalized Fibonacci sequences and their properties | 2021-06-29 | Paper |
| A new improved AES S-box with enhanced properties | 2021-06-08 | Paper |
| Generalized Fibonacci numbers and their 2-adic order | 2021-02-05 | Paper |
AN EXACT FORMULA FOR THE HARMONIC CONTINUED FRACTION Bulletin of the Australian Mathematical Society | 2021-01-27 | Paper |
| The Wiener attack on RSA revisited: a quest for the exact bound | 2020-05-27 | Paper |
| scientific article; zbMATH DE number 7174176 (Why is no real title available?) | 2020-02-26 | Paper |
| Towards enhanced security for certificateless public-key authenticated encryption with keyword search | 2020-01-10 | Paper |
| Improved cryptanalysis of the KMOV elliptic curve cryptosystem | 2020-01-10 | Paper |
Cooperative secret sharing using QR codes and symmetric keys Symmetry | 2019-10-30 | Paper |
On the harmonic continued fractions The Ramanujan Journal | 2019-08-20 | Paper |
| A generalized attack on some variants of the RSA cryptosystem | 2019-02-20 | Paper |
A generalized attack on RSA type cryptosystems Theoretical Computer Science | 2017-11-16 | Paper |
Dirichlet product for Boolean functions Journal of Applied Mathematics and Computing | 2017-11-10 | Paper |
A simple proof of Euler's continued fraction of \(e^{1/M}\) The Mathematical Gazette | 2017-10-11 | Paper |
| A QR code watermarking approach based on the DWT-DCT technique | 2017-08-25 | Paper |
A new attack on three variants of the RSA cryptosystem Information Security and Privacy | 2016-09-02 | Paper |
Trisecting an angle correctly up to arcminute Forum Geometricorum | 2016-03-11 | Paper |