| Publication | Date of Publication | Type |
|---|
| Linear systolic multiplier/squarer for fast exponentiation | 2016-06-16 | Paper |
| Partitioned systolic architecture for modular multiplication in \(\mathrm{GF}(2^{m})\) | 2016-06-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3448058 | 2015-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4917459 | 2013-04-30 | Paper |
| KCI-resilient anonymous wireless link-layer authentication protocols | 2013-01-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3098535 | 2011-11-17 | Paper |
| Robust biometric-based three-party authenticated key establishment protocols | 2011-04-21 | Paper |
| Algorithms and Computation | 2009-08-07 | Paper |
| Montgomery exponent architecture based on programmable cellular automata | 2009-04-03 | Paper |
| Elliptic curve based hardware architecture using cellular automata | 2009-04-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3602097 | 2009-02-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3601880 | 2009-02-12 | Paper |
| An Improved Popescu’s Authenticated Key Agreement Protocol | 2009-02-12 | Paper |
| One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity | 2009-02-12 | Paper |
| Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks | 2009-01-27 | Paper |
| Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA | 2009-01-20 | Paper |
| Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware | 2009-01-13 | Paper |
| Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition | 2008-11-20 | Paper |
| Authentication Based on Singular Cellular Automata | 2008-11-20 | Paper |
| Fast Exponentiaion over GF(2m) Based on Cellular Automata | 2008-09-30 | Paper |
| A novel approach for bit-serial \(AB^{2}\) multiplication in finite fields \(\mathrm{GF}(2^m)\) | 2008-03-11 | Paper |
| Parallel Processing and Applied Mathematics | 2007-09-25 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Computational Science and Its Applications – ICCSA 2004 | 2007-07-19 | Paper |
| Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns | 2007-06-06 | Paper |
| Programmable cellular automata based Montgomery hardware architecture | 2007-04-26 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| SOFSEM 2006: Theory and Practice of Computer Science | 2006-11-14 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Distributed Computing – IWDC 2005 | 2006-10-10 | Paper |
| On the security of efficient user identification scheme | 2006-05-18 | Paper |
| Computing and Combinatorics | 2006-01-11 | Paper |
| Weakness and solution of Yang et al.'s protected password changing scheme | 2005-11-16 | Paper |
| On the security of Wu-Lin's robust key authentication scheme | 2005-11-16 | Paper |
| An improvement on Yang et al.'s password authentication schemes | 2005-11-14 | Paper |
| Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers | 2005-11-14 | Paper |
| Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme | 2005-11-04 | Paper |
| Efficient verifier-based key agreement protocol for three parties without server's public key | 2005-10-28 | Paper |
| Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm | 2005-10-28 | Paper |
| Improvement of Chien--Jan's authenticated multiple-key agreement protocol without using conventional one-way function | 2005-10-28 | Paper |
| Security of Tseng--Jan's conference key distribution system | 2005-10-28 | Paper |
| Efficient nonce-based remote user authentication scheme using smart cards | 2005-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5314393 | 2005-09-05 | Paper |
| Fixing problems in Lin et al.'s OSPA protocol | 2005-08-05 | Paper |
| Cryptanalysis of Lee-Lee authenticated key agreement scheme | 2005-05-04 | Paper |
| Improvement of Lee and Lee's authenticated key agreement scheme | 2005-02-23 | Paper |
| Improvement of HWWM-authenticated key agreement protocol | 2005-02-23 | Paper |
| AOP arithmetic architectures over GF(2\(^m\)) | 2004-11-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046404 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3044768 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046403 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046421 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4808633 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4427121 | 2003-09-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4408447 | 2003-06-29 | Paper |
| Systolic multiplier for Montgomery’s algorithm | 2003-01-22 | Paper |
| A New Undeniable Signature Scheme Using Smart Cards | 2002-12-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4551365 | 2002-09-05 | Paper |
| Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm | 2002-07-14 | Paper |
| Design of a linear systolic array for computing modular multiplication and squaring in \(\text{GF}(2^m)\) | 2001-11-12 | Paper |