| Publication | Date of Publication | Type |
|---|
| Can a differential attack work for an arbitrarily large number of rounds? | 2022-03-24 | Paper |
| Analytical Characteristics of the DES | 2022-01-08 | Paper |
| Dependence of output on input in DES: Small avalanche characteristics | 2017-04-10 | Paper |
| On optimal size in truncated differential attacks | 2017-03-31 | Paper |
| Attacks on Shamir's `RSA for paranoids' | 2016-06-09 | Paper |
| Cryptographic Hash Functions and Expander Graphs: The End of the Story? | 2016-05-02 | Paper |
| SEA: A Scalable Encryption Algorithm for Small Embedded Applications | 2015-11-11 | Paper |
| Rubik’s for Cryptographers | 2015-10-14 | Paper |
| Efficient revocation and threshold pairing based cryptosystems | 2015-09-04 | Paper |
| Fault Attacks Against RSA-CRT Implementation | 2013-07-09 | Paper |
| On Polynomial Systems Arising from a Weil Descent | 2013-03-19 | Paper |
| Compact elliptic curve representations | 2011-07-11 | Paper |
| Signcryption Schemes Based on the Diffie–Hellman Problem | 2011-05-18 | Paper |
| Signcryption Schemes Based on Bilinear Maps | 2011-05-18 | Paper |
| Preimages for the Tillich-Zémor Hash Function | 2011-03-15 | Paper |
| A Differential Fault Attack Technique against SPN Structures, with Application to the AES and Khazad | 2010-03-09 | Paper |
| A New Type of Timing Attack: Application to GPS | 2010-03-09 | Paper |
| Comparing with RSA | 2010-01-07 | Paper |
| Practical Algebraic Attacks on the Hitag2 Stream Cipher | 2009-09-29 | Paper |
| Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups | 2009-05-14 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security | 2009-04-29 | Paper |
| Key Evolution Systems in Untrusted Update Environments | 2009-04-29 | Paper |
| Efficient Intrusion-Resilient Signatures Without Random Oracles | 2009-01-15 | Paper |
| Authentication of sequences with the SL2 hash function: application to video sequences | 2008-12-21 | Paper |
| Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions | 2008-11-27 | Paper |
| Full Cryptanalysis of LPS and Morgenstern Hash Functions | 2008-11-20 | Paper |
| On the Salsa20 Core Function | 2008-09-18 | Paper |
| Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent | 2008-09-18 | Paper |
| Collision Search for Elliptic Curve Discrete Logarithm over GF(2 m ) with FPGA | 2008-09-16 | Paper |
| Implementation of the AES-128 on Virtex-5 FPGAs | 2008-06-13 | Paper |
| Fault Attacks on Public Key Elements: Application to DLP-Based Schemes | 2008-06-12 | Paper |
| Improving the Time Complexity of Matsui’s Linear Cryptanalysis | 2008-05-06 | Paper |
| Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps | 2008-03-18 | Paper |
| Practical Time Capsule Signatures in the Standard Model from Bilinear Maps | 2007-11-29 | Paper |
| Identity Based Encryption Without Redundancy | 2007-09-24 | Paper |
| Parallel Key-Insulated Public Key Encryption Without Random Oracles | 2007-09-04 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information Security | 2006-10-16 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Fast Software Encryption | 2005-12-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472413 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472061 | 2004-08-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4470584 | 2004-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434888 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4425745 | 2003-09-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4425741 | 2003-09-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4425682 | 2003-09-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413851 | 2003-07-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408197 | 2003-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408211 | 2003-06-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4788568 | 2003-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4797815 | 2003-03-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4788557 | 2003-02-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536234 | 2002-11-28 | Paper |
| Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies | 2002-11-25 | Paper |
| On Rabin-Type Signatures | 2002-11-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724439 | 2002-07-22 | Paper |
| How to choose secret parameters for RSA-type cryptosystems over elliptic curves | 2002-06-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249283 | 2001-03-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4954412 | 2000-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4940685 | 2000-03-01 | Paper |
| Chinese remaindering based cryptosystems in the presence of faults | 2000-01-05 | Paper |
| Reducing the elliptic curve cryptosystem of Meyer-Müller to the cryptosystem of Rabin-Williams | 1999-01-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373643 | 1998-07-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4375717 | 1998-03-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343423 | 1997-11-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341795 | 1997-10-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4400577 | 1997-01-01 | Paper |
| CORSAIR: A Smart Card for Public Key Cryptosystems | 1994-02-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4036902 | 1993-05-18 | Paper |
| Table of large \(({\Delta{}}, D)\)-graphs | 1993-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3495643 | 1990-01-01 | Paper |
| Propagation Characteristics of the DES | 1985-01-01 | Paper |
| Grands Graphes De Degré Et Diamètre Fixés | 1983-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4744327 | 1983-01-01 | Paper |
| Tables of large graphs with given degree and diameter | 1982-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4128418 | 1976-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4082301 | 1975-01-01 | Paper |
| Permutation cascades with normalized cells | 1973-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4404789 | 1973-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5684587 | 1972-01-01 | Paper |