Publication | Date of Publication | Type |
---|
Efficient randomized incremental algorithm for the closest pair problem using Leafary trees | 2023-12-12 | Paper |
An efficient attribute-based authenticated key exchange protocol | 2023-08-02 | Paper |
Connected domination and steiner set on asteroidal triple-free graphs | 2023-01-18 | Paper |
Efficient attribute-based proxy re-encryption with constant size ciphertexts | 2022-07-06 | Paper |
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption | 2022-07-01 | Paper |
New approach to practical leakage-resilient public-key cryptography | 2021-05-03 | Paper |
Identity-Based Group Encryption Revisited | 2020-07-20 | Paper |
Sharing of Encrypted Files in Blockchain Made Simpler | 2020-06-29 | Paper |
Smart Contract-Driven Mechanism Design to Mitigate Information Diffusion in Social Networks | 2020-06-29 | Paper |
Cache me if you can: capacitated selfish replication games in networks | 2020-02-27 | Paper |
Public key encryption resilient to post-challenge leakage and tampering attacks | 2020-01-28 | Paper |
A CCA-secure collusion-resistant identity-based proxy re-encryption scheme | 2018-11-07 | Paper |
Leakage-resilient non-interactive key exchange in the continuous-memory leakage setting | 2018-11-07 | Paper |
An efficient certificateless proxy re-encryption scheme without pairing | 2018-11-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4643831 | 2018-05-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4643839 | 2018-05-29 | Paper |
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE | 2017-08-25 | Paper |
A natural family of optimization problems with arbitrarily small approximation thresholds | 2016-06-09 | Paper |
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction | 2016-01-27 | Paper |
Constant Size Ring Signature Without Random Oracle | 2015-10-20 | Paper |
A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory | 2015-10-16 | Paper |
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model | 2015-10-16 | Paper |
Efficient asynchronous verifiable secret sharing and multiparty computation | 2015-03-25 | Paper |
Possibility and complexity of probabilistic reliable communication in directed networks | 2015-03-10 | Paper |
Brief announcement | 2015-03-02 | Paper |
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary | 2014-12-12 | Paper |
Efficient single phase unconditionally secure message transmission with optimum communication complexity | 2014-12-12 | Paper |
Identity-Based Identification Schemes from ID-KEMs | 2014-09-15 | Paper |
Anonymous Identity-Based Identification Scheme in Ad-Hoc Groups without Pairings | 2014-09-15 | Paper |
On perfectly secure communication over arbitrary networks | 2014-07-25 | Paper |
Simple and efficient asynchronous byzantine agreement with optimal resilience | 2014-07-23 | Paper |
Asynchronous Byzantine agreement with optimal resilience | 2014-07-11 | Paper |
Constant phase efficient protocols for secure message transmission in directed networks | 2014-03-13 | Paper |
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission | 2014-02-17 | Paper |
Variants of Spreading Messages | 2013-11-28 | Paper |
Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round | 2013-10-23 | Paper |
Compact Stateful Encryption Schemes with Ciphertext Verifiability | 2013-04-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4902121 | 2013-01-25 | Paper |
ID Based Signcryption Scheme in Standard Model | 2012-11-06 | Paper |
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model | 2012-09-07 | Paper |
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures | 2012-09-07 | Paper |
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions | 2012-06-29 | Paper |
Cache Me If You Can: Capacitated Selfish Replication Games | 2012-06-29 | Paper |
Identity-Based Deterministic Signature Scheme without Forking-Lemma | 2011-11-10 | Paper |
Secure message transmission in asynchronous networks | 2011-08-19 | Paper |
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience | 2011-05-19 | Paper |
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality | 2011-04-05 | Paper |
A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs | 2011-02-20 | Paper |
On conditional covering problem | 2011-02-19 | Paper |
The Round Complexity of Verifiable Secret Sharing: The Statistical Case | 2010-12-07 | Paper |
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing | 2010-11-23 | Paper |
Sanitizable Signatures with Strong Transparency in the Standard Model | 2010-11-23 | Paper |
Breaking and Building of Threshold Signcryption Schemes | 2010-11-23 | Paper |
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience | 2010-11-23 | Paper |
Identity Based Public Verifiable Signcryption Scheme | 2010-10-12 | Paper |
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience | 2010-09-29 | Paper |
Communication Optimal Multi-valued Asynchronous Broadcast Protocol | 2010-08-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q3579425 | 2010-08-06 | Paper |
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience | 2010-05-04 | Paper |
Variants of Spreading Messages | 2010-02-09 | Paper |
Pathwidth and Searching in Parameterized Threshold Graphs | 2010-02-09 | Paper |
Perfectly reliable message transmission | 2010-01-29 | Paper |
Identity Based Aggregate Signcryption Schemes | 2009-12-17 | Paper |
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience | 2009-12-17 | Paper |
The Guarding Problem – Complexity and Approximation | 2009-12-11 | Paper |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme | 2009-12-11 | Paper |
Information Theoretically Secure Multi Party Set Intersection Re-visited | 2009-12-09 | Paper |
On Exponential Lower Bound for Protocols for Reliable Communication in Networks | 2009-12-03 | Paper |
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security | 2009-11-26 | Paper |
An Efficient Identity-Based Signcryption Scheme for Multiple Receivers | 2009-10-28 | Paper |
The Round Complexity of Verifiable Secret Sharing Revisited | 2009-10-20 | Paper |
On the Security of Identity Based Ring Signcryption Schemes | 2009-09-29 | Paper |
Perfectly reliable and secure message transmission tolerating mobile adversary | 2009-05-12 | Paper |
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks | 2009-03-26 | Paper |
On Proactive Perfectly Secure Message Transmission | 2009-03-06 | Paper |
Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme | 2009-02-24 | Paper |
Efficient and Provably Secure Certificateless Multi-receiver Signcryption | 2009-01-27 | Paper |
Round Efficient Unconditionally Secure Multiparty Computation Protocol | 2009-01-22 | Paper |
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary | 2009-01-09 | Paper |
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited | 2008-11-20 | Paper |
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary | 2008-09-02 | Paper |
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary | 2008-07-08 | Paper |
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary | 2008-04-15 | Paper |
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality | 2008-04-11 | Paper |
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission | 2008-04-11 | Paper |
On Optimal Probabilistic Asynchronous Byzantine Agreement | 2008-03-06 | Paper |
Alternative Protocols for Generalized Oblivious Transfer | 2008-03-06 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Weighted irredundance of interval graphs. | 2006-01-17 | Paper |
Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4808674 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450745 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417424 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413003 | 2003-07-17 | Paper |
Asynchronous Secure Communication Tolerating Mixed Adversaries | 2003-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788579 | 2003-01-28 | Paper |
The \(K_r\)-packing problem | 2002-01-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707598 | 2001-07-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707599 | 2001-07-08 | Paper |
On the complexity of partial order properties | 2001-06-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4520304 | 2001-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4525703 | 2001-01-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4525750 | 2001-01-24 | Paper |
Approximation Algorithms for the Traveling Salesman Problem with Range Condition | 2000-12-19 | Paper |
Edge-disjoint paths in permutation graphs | 2000-11-30 | Paper |
Feedback vertex set on cocomparability graphs | 2000-11-30 | Paper |
A linear algorithm for centering a spanning tree of a biconnected graph | 2000-11-30 | Paper |
Algorithmic aspects of clique-transversal and clique-independent sets | 2000-11-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4514739 | 2000-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4942257 | 2000-05-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4268431 | 1999-10-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4232775 | 1999-08-17 | Paper |
Symmetric min-max heap: a simpler data structure for double-ended priority queue | 1999-04-28 | Paper |
Parallel algorithms on interval graphs | 1998-01-29 | Paper |
Restrictions of minimum spanner problems | 1997-12-14 | Paper |
The parity path problem on some subclasses of perfect graphs | 1997-04-07 | Paper |
Edge domination on bipartite permutation graphs and cotriangulated graphs | 1997-02-28 | Paper |
Optimal parallel algorithms for path problems on planar graphs | 1997-02-28 | Paper |
Approximate triclique coloring for register allocation | 1997-02-28 | Paper |
Tree 3-spanners on interval, permutation and regular bipartite graphs | 1997-02-27 | Paper |
An efficient distributed algorithm for centering a spanning tree of a biconnected graph | 1997-02-27 | Paper |
All-pairs-shortest-length on strongly chordal graphs | 1996-10-09 | Paper |
Efficient algorithms for minimal disjoint path problems on chordal graphs | 1996-08-26 | Paper |
A linear algorithms for the two paths problem on permutation graphs | 1996-08-26 | Paper |
Weighted independent perfect domination on cocomparability graphs | 1996-08-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4847025 | 1996-05-28 | Paper |
Efficient parallel algorithms for permutation graphs | 1995-07-06 | Paper |
Treewidth of Circular-Arc Graphs | 1994-12-20 | Paper |
A linear algorithm for the all-bidirectional-edges problem on planar graphs | 1993-05-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4028893 | 1993-03-28 | Paper |
An optimal algorithm for reconstructing a binary tree | 1993-01-16 | Paper |
Generalized vertex covering in interval graphs | 1993-01-16 | Paper |
An O\((n \log{}n)\) algorithm for a maxmin location problem | 1992-09-27 | Paper |
On finding the minimum bandwidth of interval graphs | 1992-06-28 | Paper |
An optimal algorithm to solve the all-pair shortest path problem on interval graphs | 1992-06-28 | Paper |
An efficient algorithm for finding a two-pair, and its applications | 1992-06-25 | Paper |
Efficient reduction for path problems on circular-arc graphs | 1991-01-01 | Paper |
Linear algorithm for optimal path cover problem on interval graphs | 1990-01-01 | Paper |
New sequential and parallel algorithms for interval graph recognition | 1990-01-01 | Paper |
A fast algorithm for computing sparse visibility graphs | 1990-01-01 | Paper |
Linear algorithm for domatic number problem on interval graphs | 1989-01-01 | Paper |
Optimal parallel algorithms on circular-arc graphs | 1989-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3361906 | 1989-01-01 | Paper |
A unified approach to domination problems on interval graphs | 1988-01-01 | Paper |
Total domination in interval graphs revisited | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3790547 | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3798453 | 1988-01-01 | Paper |
Matrix transposition in a magnetic bubble memory | 1988-01-01 | Paper |
A linear space algorithm for the LCS problem | 1987-01-01 | Paper |
On the minimum number of additions required to compute a quadratic form | 1983-01-01 | Paper |