Publication | Date of Publication | Type |
---|
On-line/off-line DCR-based homomorphic encryption and applications | 2023-10-04 | Paper |
Balanced non-adjacent forms | 2023-05-12 | Paper |
Decentralized policy-hiding ABE with receiver privacy | 2022-08-25 | Paper |
The eleventh power residue symbol | 2021-05-25 | Paper |
New number-theoretic cryptographic primitives | 2021-05-03 | Paper |
Protecting ECC against fault attacks: the ring extension method revisited | 2021-05-03 | Paper |
Private Data Aggregation over Selected Subsets of Users | 2020-07-20 | Paper |
Differential attacks on deterministic signatures | 2020-01-21 | Paper |
Function-revealing encryption (definitions and constructions) | 2018-10-17 | Paper |
Privacy-preserving ridge regression with only linearly-homomorphic encryption | 2018-08-10 | Paper |
Efficient cryptosystems from \(2^k\)-th power residue symbols | 2017-05-22 | Paper |
Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves | 2017-04-12 | Paper |
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares | 2016-08-31 | Paper |
Secure ElGamal-Type Cryptosystems Without Message Encoding | 2016-05-02 | Paper |
Identity-Based Cryptosystems and Quadratic Residuosity | 2016-04-13 | Paper |
Addition with Blinded Operands | 2016-03-10 | Paper |
The distributions of individual bits in the output of multiplicative operations | 2015-11-18 | Paper |
Born and raised distributively | 2015-09-03 | Paper |
Group Signatures with Message-Dependent Opening in the Standard Model | 2014-03-28 | Paper |
Toward Practical Group Encryption | 2014-01-24 | Paper |
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data | 2013-11-12 | Paper |
On Elliptic Curve Paillier Schemes | 2013-09-20 | Paper |
Efficient Cryptosystems from 2 k -th Power Residue Symbols | 2013-05-31 | Paper |
Partial Key Exposure on RSA with Private Exponents Larger Than N | 2012-06-29 | Paper |
On Quisquater’s Multiplication Algorithm | 2012-06-08 | Paper |
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation | 2011-06-29 | Paper |
Notions and relations for RKA-secure permutation and function families | 2011-06-03 | Paper |
How (not) to design strong-RSA signatures | 2011-04-08 | Paper |
Binary Huff Curves | 2011-02-11 | Paper |
Huff’s Model for Elliptic Curves | 2010-09-29 | Paper |
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves | 2010-08-17 | Paper |
Coordinate Blinding over Large Prime Fields | 2010-08-17 | Paper |
Efficient Arithmetic on Hessian Curves | 2010-05-28 | Paper |
The Polynomial Composition Problem in (ℤ/nℤ)[X] | 2010-04-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5187957 | 2010-03-09 | Paper |
GCD-Free Algorithms for Computing Modular Inverses | 2010-03-09 | Paper |
Information and Communications Security | 2010-02-23 | Paper |
Chosen-Ciphertext Secure RSA-Type Cryptosystems | 2009-12-11 | Paper |
Highly Regular m-Ary Powering Ladders | 2009-12-09 | Paper |
On Cryptographic Schemes Based on Discrete Logarithms and Factoring | 2009-11-26 | Paper |
Remarks on ``Analysis of one popular group signature scheme in Asiacrypt 2006 | 2009-10-12 | Paper |
Cryptanalysis of a pay-as-you-watch system | 2009-07-09 | Paper |
Exponent Recoding and Regular Exponentiation Algorithms | 2009-07-07 | Paper |
On the TYS Signature Scheme | 2009-02-10 | Paper |
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles | 2009-01-09 | Paper |
Authentication of sequences with the SL2 hash function: application to video sequences | 2008-12-21 | Paper |
ID-based secret-key cryptography | 2008-12-21 | Paper |
Highly Regular Right-to-Left Algorithms for Scalar Multiplication | 2008-09-16 | Paper |
On Second-Order Differential Power Analysis | 2008-08-29 | Paper |
Fast Generation of Prime Numbers on Portable Devices: An Update | 2008-08-29 | Paper |
Fast Point Multiplication on Elliptic Curves without Precomputation | 2008-08-19 | Paper |
Twisted Edwards Curves | 2008-06-13 | Paper |
On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers | 2008-06-10 | Paper |
A Practical and Tightly Secure Signature Scheme Without Hash Function | 2008-04-17 | Paper |
RSA Moduli with a Predetermined Portion: Techniques and Applications | 2008-04-15 | Paper |
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity | 2007-01-09 | Paper |
Optimal left-to-right binary signed-digit recoding | 2007-01-09 | Paper |
Checking before output may not be enough against fault-based cryptanalysis | 2007-01-09 | Paper |
Trading inversions for multiplications in elliptic curve cryptography | 2006-05-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374921 | 2006-03-01 | Paper |
Elliptic curve cryptosystems in the presence of permanent and transient faults | 2005-08-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043924 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043950 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043951 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043953 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472061 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472079 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4426682 | 2003-09-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4426683 | 2003-09-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4425714 | 2003-09-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409121 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797391 | 2003-04-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797813 | 2003-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797815 | 2003-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536239 | 2002-11-28 | Paper |
On Rabin-Type Signatures | 2002-11-25 | Paper |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) | 2002-11-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724610 | 2002-10-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536806 | 2002-10-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724439 | 2002-07-22 | Paper |
How to choose secret parameters for RSA-type cryptosystems over elliptic curves | 2002-06-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945039 | 2000-08-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945045 | 2000-08-24 | Paper |
Chinese remaindering based cryptosystems in the presence of faults | 2000-01-05 | Paper |
Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams | 1999-01-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373643 | 1998-07-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4375717 | 1998-03-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4400577 | 1997-01-01 | Paper |