| Publication | Date of Publication | Type |
|---|
| Non-interactive zero-knowledge functional proofs | 2024-09-13 | Paper |
Efficient generation of elliptic curve cryptosystems Lecture Notes in Computer Science | 2024-01-29 | Paper |
Analysis and experimentation on list update algorithms Lecture Notes in Computer Science | 2023-12-12 | Paper |
| Using blockchain to control access to cloud data | 2019-10-31 | Paper |
| Robust key management for mobile ad hoc networks | 2009-11-11 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
| scientific article; zbMATH DE number 2048539 (Why is no real title available?) | 2004-03-01 | Paper |
Decomposing attacks on asymmetric cryptography based on mapping compositions Journal of Cryptology | 2003-10-12 | Paper |
On identification secret sharing schemes. Information and Computation | 2003-08-19 | Paper |
| scientific article; zbMATH DE number 1504557 (Why is no real title available?) | 2003-01-16 | Paper |
| scientific article; zbMATH DE number 1500485 (Why is no real title available?) | 2002-07-28 | Paper |
Duadic sequences of prime lengths Discrete Mathematics | 2001-11-19 | Paper |
The weight distribution of \(C_5(1,n)\) Designs, Codes and Cryptography | 2001-10-16 | Paper |
| scientific article; zbMATH DE number 1588469 (Why is no real title available?) | 2001-07-17 | Paper |
| scientific article; zbMATH DE number 1612523 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1421003 (Why is no real title available?) | 2001-04-17 | Paper |
A fast algorithm for determining the linear complexity of a sequence with period \(p^n\) over GF\((q)\) IEEE Transactions on Information Theory | 2001-03-19 | Paper |
Several classes of binary sequences with three-level autocorrelation IEEE Transactions on Information Theory | 2000-09-07 | Paper |
A generalization of algebraic-geometry codes IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Constructions of authentication codes from algebraic curves over finite fields IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Constructions of sequences with almost perfect linear complexity profile from curves over finite fields Finite Fields and their Applications | 2000-09-06 | Paper |
Scalable threshold closure Theoretical Computer Science | 2000-08-23 | Paper |
| scientific article; zbMATH DE number 1418302 (Why is no real title available?) | 2000-07-26 | Paper |
| scientific article; zbMATH DE number 1302797 (Why is no real title available?) | 2000-02-15 | Paper |
Constructions of algebraic-geometry codes IEEE Transactions on Information Theory | 1999-11-21 | Paper |
Sequences with almost perfect linear complexity profiles and curves over finite fields IEEE Transactions on Information Theory | 1999-11-21 | Paper |
| scientific article; zbMATH DE number 1339967 (Why is no real title available?) | 1999-09-22 | Paper |
| scientific article; zbMATH DE number 1341885 (Why is no real title available?) | 1999-09-22 | Paper |
A new construction of algebraic-geometry codes Applicable Algebra in Engineering, Communication and Computing | 1999-01-01 | Paper |
| scientific article; zbMATH DE number 1189369 (Why is no real title available?) | 1998-10-08 | Paper |