| Publication | Date of Publication | Type |
|---|
| An Algebra for Composing Enterprise Privacy Policies | 2022-03-07 | Paper |
| Initiator-Resilient Universally Composable Key Exchange | 2022-02-16 | Paper |
| Group Key Establishment in a Quantum-Future Scenario | 2021-10-06 | Paper |
| Password-authenticated group key establishment from smooth projective hash functions | 2020-02-20 | Paper |
| On "A new representation of elements of finite fields GF(2/sup m/) yielding small complexity arithmetic circuits" | 2018-07-09 | Paper |
| On the security of the Courtois-Finiasz-Sendrier signature | 2018-06-19 | Paper |
| Private set intersection: new generic constructions and feasibility results | 2017-10-12 | Paper |
| Masking Large Keys in Hardware: A Masked Implementation of McEliece | 2016-05-19 | Paper |
| Applying Grover’s Algorithm to AES: Quantum Resource Estimates | 2016-04-26 | Paper |
| Combined schemes for signature and encryption: the public-key and the identity-based setting | 2016-03-10 | Paper |
| Differential Power Analysis of a McEliece Cryptosystem | 2016-03-10 | Paper |
| Quantum circuits for \(\mathbb F_{2^n}\)-multiplication with subquadratic gate count | 2015-08-11 | Paper |
| On the security margin of MAC striping | 2015-07-15 | Paper |
| Automatic synthesis of quantum circuits for point addition on ordinary binary elliptic curves | 2015-04-13 | Paper |
| Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption | 2014-10-14 | Paper |
| A note on quantum related-key attacks | 2014-10-07 | Paper |
| Scalable attribute-based group key establishment: from~passive to active and deniable | 2014-10-02 | Paper |
| Deniable Group Key Agreement | 2014-08-21 | Paper |
| Towards Provably Secure Group Key Agreement Building on Group Theory | 2014-08-21 | Paper |
| On using probabilistic Turing machines to model participants in cryptographic protocols | 2014-01-10 | Paper |
| Scalable Deniable Group Key Establishment | 2013-08-07 | Paper |
| Security of message authentication codes in the presence of key-dependent messages | 2012-05-22 | Paper |
| Identity-based non-interactive key distribution with forward security | 2012-05-22 | Paper |
| Multi-authority attribute-based encryption with honest-but-curious central authority | 2012-05-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3101666 | 2011-11-30 | Paper |
| Attribute-based group key establishment | 2011-06-03 | Paper |
| Cryptanalysis of a 2-party key establishment based on a semigroup action problem | 2011-05-17 | Paper |
| Cryptanalysis of the Tillich-Zémor hash function | 2011-04-01 | Paper |
| Security of signature schemes in the presence of key-dependent messages | 2011-02-17 | Paper |
| Communication-Efficient 2-Round Group Key Establishment from Pairings | 2011-02-11 | Paper |
| PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware | 2011-01-10 | Paper |
| Cryptanalysis of an authentication scheme using truncated polynomials | 2010-08-20 | Paper |
| A one-time signature using run-length encoding | 2010-06-09 | Paper |
| Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday | 2010-05-19 | Paper |
| A ciphertext-only attack on Polly Two | 2010-04-20 | Paper |
| Hardware to Solve Sparse Systems of Linear Equations over GF(2) | 2010-03-09 | Paper |
| Power attacks on a side-channel resistant elliptic curve implementation | 2009-07-21 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3545321 | 2008-12-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3545324 | 2008-12-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3522521 | 2008-09-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3523621 | 2008-09-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3522416 | 2008-09-03 | Paper |
| Cryptanalysis of a Hash Function Proposed at ICISC 2006 | 2008-05-06 | Paper |
| A Simpler Sieving Device: Combining ECM and TWIRL | 2008-05-06 | Paper |
| On Subliminal Channels in Deterministic Signature Schemes | 2008-03-17 | Paper |
| Non-wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-Bit | 2007-11-29 | Paper |
| Computing restrictions of ideals in finitely generated \(k\)-algebras by means of Buchberger's algorithm | 2007-10-23 | Paper |
| (Password) Authenticated Key Establishment: From 2-Party to Group | 2007-08-30 | Paper |
| On ideal and subalgebra coefficients in a class k -algebras | 2007-08-07 | Paper |
| Pitfalls in public key cryptosystems based on free partially commutative monoids and groups | 2007-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3429504 | 2007-04-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3421466 | 2007-02-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3421472 | 2007-02-13 | Paper |
| A redundant representation of GF(q<sup>n</sup>) for designing arithmetic circuits | 2007-01-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3410209 | 2006-11-23 | Paper |
| Weak keys in MST\(_{1}\) | 2006-05-29 | Paper |
| A key substitution attack on SFLASHv3 | 2006-01-13 | Paper |
| SOFSEM 2005: Theory and Practice of Computer Science | 2005-12-07 | Paper |
| Theory of Cryptography | 2005-12-07 | Paper |
| Cryptanalysis of Polly Cracker | 2005-05-11 | Paper |
| Towards a uniform description of several group based cryptographic primitives | 2005-01-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3156428 | 2005-01-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4817439 | 2004-09-23 | Paper |
| A reaction attack on a public key cryptosystem based on the word problem | 2004-09-22 | Paper |
| On Minimal Length Factorizations of Finite Groups | 2004-09-06 | Paper |
| On computing a separating transcendence basis | 2004-09-01 | Paper |
| On the security of two public key cryptosystems using non-abelian groups | 2004-08-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4448407 | 2004-02-18 | Paper |
| Cryptanalysis of a knapsack-like cryptosystem | 2003-10-14 | Paper |
| A Practical Attack on Some Braid Group Based Cryptographic Primitives | 2003-07-27 | Paper |
| A Dedicated Sieving Hardware | 2003-07-27 | Paper |
| Involutive bases in the Weyl algebra. | 2003-03-23 | Paper |
| Attacking the Affine Parts of SFLASH | 2002-12-02 | Paper |
| Gröbner bases applied to finitely generated field extensions | 2002-11-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536808 | 2002-07-28 | Paper |
| Clouds over a public key cryptosystem based on Lyndon words | 2002-07-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724591 | 2002-07-16 | Paper |
| Recognizing simple subextensions of purely transcendental field extensions | 2002-06-18 | Paper |
| On ideal and subalgebra coefficients in semigroup algebras | 2002-02-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4707231 | 2002-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724594 | 2001-07-12 | Paper |
| Basic algorithms for rational function fields | 2000-05-07 | Paper |
| Freeness, linear disjointness, and implicitization -- a classical approach. | 2000-05-02 | Paper |
| Decomposing a matrix into circulant and diagonal factors | 2000-03-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4394974 | 1999-05-31 | Paper |