| Publication | Date of Publication | Type |
|---|
Can a differential attack work for an arbitrarily large number of rounds? | 2022-03-24 | Paper |
Analytical characteristics of the DES Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2022-01-08 | Paper |
Dependence of output on input in DES: small avalanche characteristics Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2017-04-10 | Paper |
On optimal size in truncated differential attacks Studia Scientiarum Mathematicarum Hungarica | 2017-03-31 | Paper |
Attacks on Shamir's `RSA for paranoids' Information Processing Letters | 2016-06-09 | Paper |
Cryptographic hash functions and expander graphs: the end of the story? The New Codebreakers | 2016-05-02 | Paper |
SEA: A Scalable Encryption Algorithm for Small Embedded Applications Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
Rubik’s for Cryptographers Notices of the American Mathematical Society | 2015-10-14 | Paper |
Efficient revocation and threshold pairing based cryptosystems Proceedings of the twenty-second annual symposium on Principles of distributed computing | 2015-09-04 | Paper |
Fault attacks against RSA-CRT implementation Information Security and Cryptography | 2013-07-09 | Paper |
On polynomial systems arising from a Weil descent Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Compact elliptic curve representations Journal of Mathematical Cryptology | 2011-07-11 | Paper |
Signcryption schemes based on the Diffie-Hellman problem Practical Signcryption | 2011-05-18 | Paper |
Signcryption schemes based on bilinear maps Practical Signcryption | 2011-05-18 | Paper |
Preimages for the Tillich-Zémor hash function Selected Areas in Cryptography | 2011-03-15 | Paper |
A differential fault attack technique against SPN structures, with application to the AES and KHAZAD. Lecture Notes in Computer Science | 2010-03-09 | Paper |
A new type of timing attack: application to GPS. Lecture Notes in Computer Science | 2010-03-09 | Paper |
Comparing with RSA Cryptography and Coding | 2010-01-07 | Paper |
Practical Algebraic Attacks on the Hitag2 Stream Cipher Lecture Notes in Computer Science | 2009-09-29 | Paper |
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Key Evolution Systems in Untrusted Update Environments Information Security and Cryptology | 2009-04-29 | Paper |
Efficient Intrusion-Resilient Signatures Without Random Oracles Information Security and Cryptology | 2009-01-15 | Paper |
Authentication of sequences with the SL2 hash function: application to video sequences Journal of Computer Security | 2008-12-21 | Paper |
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions Lecture Notes in Computer Science | 2008-11-27 | Paper |
Full Cryptanalysis of LPS and Morgenstern Hash Functions Lecture Notes in Computer Science | 2008-11-20 | Paper |
On the Salsa20 Core Function Fast Software Encryption | 2008-09-18 | Paper |
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent Fast Software Encryption | 2008-09-18 | Paper |
Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
Implementation of the AES-128 on Virtex-5 FPGAs Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes Public Key Infrastructure | 2008-06-12 | Paper |
Improving the Time Complexity of Matsui’s Linear Cryptanalysis Lecture Notes in Computer Science | 2008-05-06 | Paper |
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps Lecture Notes in Computer Science | 2008-03-18 | Paper |
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Identity Based Encryption Without Redundancy Applied Cryptography and Network Security | 2007-09-24 | Paper |
Parallel Key-Insulated Public Key Encryption Without Random Oracles Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Public Key Cryptography - PKC 2006 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
scientific article; zbMATH DE number 2080177 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2079917 (Why is no real title available?) | 2004-08-03 | Paper |
scientific article; zbMATH DE number 2077189 (Why is no real title available?) | 2004-07-01 | Paper |
scientific article; zbMATH DE number 2009969 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 1979312 (Why is no real title available?) | 2003-09-11 | Paper |
scientific article; zbMATH DE number 1979308 (Why is no real title available?) | 2003-09-11 | Paper |
scientific article; zbMATH DE number 1979270 (Why is no real title available?) | 2003-09-11 | Paper |
scientific article; zbMATH DE number 1951602 (Why is no real title available?) | 2003-07-21 | Paper |
scientific article; zbMATH DE number 1941130 (Why is no real title available?) | 2003-06-29 | Paper |
scientific article; zbMATH DE number 1941137 (Why is no real title available?) | 2003-06-29 | Paper |
scientific article; zbMATH DE number 1857519 (Why is no real title available?) | 2003-05-19 | Paper |
scientific article; zbMATH DE number 1878345 (Why is no real title available?) | 2003-03-09 | Paper |
scientific article; zbMATH DE number 1857508 (Why is no real title available?) | 2003-02-02 | Paper |
scientific article; zbMATH DE number 1759301 (Why is no real title available?) | 2002-11-28 | Paper |
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies Cryptography and Coding | 2002-11-25 | Paper |
On Rabin-Type Signatures Cryptography and Coding | 2002-11-25 | Paper |
scientific article; zbMATH DE number 1617928 (Why is no real title available?) | 2002-07-22 | Paper |
How to choose secret parameters for RSA-type cryptosystems over elliptic curves Designs, Codes and Cryptography | 2002-06-10 | Paper |
scientific article; zbMATH DE number 1302809 (Why is no real title available?) | 2001-03-18 | Paper |
scientific article; zbMATH DE number 1456814 (Why is no real title available?) | 2000-06-07 | Paper |
scientific article; zbMATH DE number 1406770 (Why is no real title available?) | 2000-03-01 | Paper |
Chinese remaindering based cryptosystems in the presence of faults Journal of Cryptology | 2000-01-05 | Paper |
Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams Designs, Codes and Cryptography | 1999-01-10 | Paper |
scientific article; zbMATH DE number 1107698 (Why is no real title available?) | 1998-07-03 | Paper |
scientific article; zbMATH DE number 1113951 (Why is no real title available?) | 1998-03-05 | Paper |
scientific article; zbMATH DE number 1030981 (Why is no real title available?) | 1997-11-23 | Paper |
scientific article; zbMATH DE number 1024100 (Why is no real title available?) | 1997-10-20 | Paper |
scientific article; zbMATH DE number 1182512 (Why is no real title available?) | 1997-01-01 | Paper |
CORSAIR: A Smart Card for Public Key Cryptosystems Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings | 1994-02-17 | Paper |
scientific article; zbMATH DE number 177057 (Why is no real title available?) | 1993-05-18 | Paper |
Table of large \(({\Delta{}}, D)\)-graphs Discrete Applied Mathematics | 1993-01-16 | Paper |
scientific article; zbMATH DE number 4170086 (Why is no real title available?) | 1990-01-01 | Paper |
Propagation Characteristics of the DES Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 1985-01-01 | Paper |
Grands Graphes De Degré Et Diamètre Fixés Combinatorial Mathematics, Proceedings of the International Colloquium on Graph Theory and Combinatorics | 1983-01-01 | Paper |
scientific article; zbMATH DE number 3799729 (Why is no real title available?) | 1983-01-01 | Paper |
Tables of large graphs with given degree and diameter Information Processing Letters | 1982-01-01 | Paper |
scientific article; zbMATH DE number 3555904 (Why is no real title available?) | 1976-01-01 | Paper |
scientific article; zbMATH DE number 3501011 (Why is no real title available?) | 1975-01-01 | Paper |
Permutation cascades with normalized cells Information and Control | 1973-01-01 | Paper |
scientific article; zbMATH DE number 3438746 (Why is no real title available?) | 1973-01-01 | Paper |
scientific article; zbMATH DE number 3422278 (Why is no real title available?) | 1972-01-01 | Paper |