| Publication | Date of Publication | Type |
|---|
| Complete signature randomization in an algebraic cryptoscheme with a hidden group | 2024-06-19 | Paper |
| Vector finite fields of characteristic two as algebraic support of multivariate cryptography | 2024-05-29 | Paper |
| Split logarithm problem and a candidate for a post-quantum signature scheme | 2023-09-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5093674 | 2022-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5091556 | 2022-07-26 | Paper |
| A novel version of the hidden logarithm problem for post-quantum signature algorithms | 2022-05-23 | Paper |
| Digital signature scheme set in a hidden cyclic group | 2021-09-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5004765 | 2021-08-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5151172 | 2021-02-16 | Paper |
| Commutative Encryption Method Based on Hidden Logarithm Problem | 2021-01-12 | Paper |
| Post-quantum signature algorithms based on the hidden discrete logarithm problem | 2020-11-02 | Paper |
| Post-quantum commutative encryption algorithm | 2020-11-02 | Paper |
| Digital signature scheme with doubled verification equation | 2020-11-02 | Paper |
| Collective Signature Protocols for Signing Groups | 2020-08-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5203920 | 2019-12-09 | Paper |
| Finite Non-Commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem | 2019-06-07 | Paper |
| On some groupoids of small orders with Bol-Moufang type of identities | 2018-12-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4684098 | 2018-09-27 | Paper |
| Provably sender-deniable encryption scheme | 2018-07-03 | Paper |
| Stream deniable-encryption algorithms | 2018-07-03 | Paper |
| Non-commutative finite associative algebras of 2-dimensional vectors | 2018-07-03 | Paper |
| Generating cubic equations as a method for public encryption | 2016-11-18 | Paper |
| Bi-deniable public-key encryption protocol which is secure against active coercive adversary | 2016-11-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3464782 | 2016-01-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3464875 | 2016-01-27 | Paper |
| SOFTWARE ENCRYPTION ALGORITHMS FOR TRANSPARENT PROTECTION TECHNOLOGY | 2015-11-13 | Paper |
| FLEXIBLE BLOCK CIPHER WITH PROVABLY INEQUIVALENT CRYPTALGORITHM MODIFICATIONS | 2015-11-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5250575 | 2015-05-21 | Paper |
| Short signatures from the difficulty of factoring problem | 2014-10-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5168127 | 2014-07-03 | Paper |
| New algorithms and protocols for information authentication in automatic control systems | 2009-05-07 | Paper |
| Cryptoschemes based on new signature formation mechanism | 2007-06-26 | Paper |
| DDP-based ciphers: differential analysis of SPECTR-H64 | 2006-09-13 | Paper |
| Variable bit permutations: linear characteristics and pure VBP-based cipher | 2005-11-21 | Paper |
| Algorithms for information conversion based on controlled two-place operations | 2005-08-12 | Paper |
| Controlled operation-based fast methods of data protection in automated control systems | 2005-06-17 | Paper |
| Protective data transformations in ACSs on the basis of a new primitive | 2005-06-17 | Paper |
| Flexible algorithms for protection of information in automatic control systems | 2004-10-19 | Paper |
| Fast data encryption for automatic control systems | 2004-10-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4530851 | 2002-06-16 | Paper |
| A cipher based on data-dependent permutations | 2002-05-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4330562 | 2002-05-13 | Paper |
| Fast block ciphers based on controlled permutations | 2001-10-14 | Paper |
| Software-implementable pseudoprobabilistic fast block ciphers | 1999-04-28 | Paper |
| Fast software encryption system based on local pseudorandomness | 1998-10-01 | Paper |
| Software encryption: New 64-bit block cryptoscheme | 1998-10-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4211195 | 1998-09-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4211196 | 1998-09-14 | Paper |
| New design principle for cryptographic modules in computer security systems | 1995-05-17 | Paper |