Publication | Date of Publication | Type |
---|
Optimizing rectangle attacks: a unified and generic framework for key recovery | 2023-08-25 | Paper |
Improving bounds on elliptic curve hidden number problem for ECDH key exchange | 2023-08-25 | Paper |
Inferring sequences produced by the quadratic generator | 2023-08-21 | Paper |
Quantum attacks on PRFs based on public random permutations | 2023-08-14 | Paper |
Quantum attacks on Lai-Massey structure | 2023-07-07 | Paper |
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy | 2023-06-30 | Paper |
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs | 2023-05-26 | Paper |
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials | 2023-05-12 | Paper |
New cryptanalysis of LowMC with algebraic techniques | 2023-04-28 | Paper |
Binary Darboux transformation, solitons, periodic waves and modulation instability for a nonlocal Lakshmanan-Porsezian-Daniel equation | 2023-02-17 | Paper |
Rotational differential-linear cryptanalysis revisited | 2023-01-05 | Paper |
Parameter identification for portfolio optimization with a slow stochastic factor | 2022-11-28 | Paper |
Several classes of PcN power functions over finite fields | 2022-10-13 | Paper |
A new method to solve the Hamilton-Jacobi-Bellman equation for a stochastic portfolio optimization model with boundary memory | 2022-09-23 | Paper |
On a vortex filament with the axial velocity | 2022-09-02 | Paper |
Hybrid solutions for the (2+1)-dimensional variable-coefficient Caudrey-Dodd-Gibbon-Kotera-Sawada equation in fluid mechanics | 2022-08-29 | Paper |
Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK | 2022-08-11 | Paper |
Integer LWE with non-subgaussian error and related attacks | 2022-07-13 | Paper |
New results for nonlinear fractional jerk equations with resonant boundary value conditions | 2022-04-27 | Paper |
The existence of solutions and generalized Lyapunov-type inequalities to boundary value problems of differential equations of variable order | 2022-04-25 | Paper |
On definition of solution of initial value problem for fractional differential equation of variable order | 2022-04-25 | Paper |
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks | 2022-04-22 | Paper |
Vector bright soliton interactions of the two-component AB system in a baroclinic fluid | 2022-04-21 | Paper |
Revisiting orthogonal lattice attacks on approximate common divisor problems | 2022-03-23 | Paper |
Attacks on beyond-birthday-bound MACs in the quantum setting | 2022-03-22 | Paper |
MNN-IK: Mixing neural network and numerical IK for human posing | 2022-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q5022373 | 2022-01-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5022384 | 2022-01-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5022468 | 2022-01-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q3385518 | 2021-12-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3385333 | 2021-12-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5017465 | 2021-12-17 | Paper |
Further results on optimal ternary cyclic codes | 2021-09-03 | Paper |
Security analysis of subterranean 2.0 | 2021-08-02 | Paper |
Some classes of power functions with low \(c\)-differential uniformity over finite fields | 2021-06-23 | Paper |
Higher-order hybrid waves for the (2 + 1)-dimensional Boiti-Leon-Manna-Pempinelli equation for an irrotational incompressible fluid via the modified Pfaffian technique | 2021-05-19 | Paper |
Several classes of PcN power functions over finite fields | 2021-04-26 | Paper |
On the quintic time-dependent coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics | 2020-08-04 | Paper |
New results on Modular Inversion Hidden Number problem and inversive congruential generator | 2020-05-20 | Paper |
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction | 2020-05-12 | Paper |
New classes of optimal ternary cyclic codes with minimum distance four | 2020-04-09 | Paper |
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS | 2020-03-09 | Paper |
Quintic time-dependent-coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics: bilinear forms and dark/anti-dark/gray solitons | 2020-02-18 | Paper |
Cryptanalysis of elliptic curve hidden number problem from PKC 2017 | 2020-01-31 | Paper |
Constructions of Involutions Over Finite Fields | 2020-01-28 | Paper |
Stochastic resonance in multi-scale bistable array | 2020-01-13 | Paper |
Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber | 2019-11-27 | Paper |
Permutation polynomials of the form \(x + \gamma \mathrm{Tr}_q^{q^n}(h(x))\) | 2019-11-22 | Paper |
The existeness and uniqueness result of solutions to initial value problems of nonlinear diffusion equations involving with the conformable variable derivative | 2019-07-29 | Paper |
The uniqueness of solution for initial value problems for fractional differential equation involving the Caputo-Fabrizio derivative | 2019-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4630952 | 2019-04-23 | Paper |
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints | 2019-01-23 | Paper |
Partial prime factor exposure attacks on RSA and its Takagi's variant | 2018-12-07 | Paper |
Improved differential analysis of block cipher PRIDE | 2018-12-07 | Paper |
Existence of solutions to a coupled system of fractional differential equations with infinite-point boundary value conditions at resonance | 2018-12-03 | Paper |
Existence and uniqueness of solutions for a higher-order coupled fractional differential equations at resonance | 2018-11-13 | Paper |
A construction of 1-resilient Boolean functions with good cryptographic properties | 2018-11-08 | Paper |
Implicit factorization of RSA moduli revisited (short paper) | 2018-10-24 | Paper |
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s | 2018-10-24 | Paper |
Related-key impossible differential analysis of full Khudra | 2018-10-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4690345 | 2018-10-22 | Paper |
Cryptanalysis and improved construction of a group key agreement for secure group communication | 2018-10-18 | Paper |
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption | 2018-10-18 | Paper |
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis | 2018-10-18 | Paper |
A Deterministic Algorithm for Computing Divisors in an Interval | 2018-09-26 | Paper |
Positive solutions to periodic boundary value problems of nonlinear fractional differential equations at resonance | 2018-08-10 | Paper |
Three new classes of generalized almost perfect nonlinear power functions | 2018-08-08 | Paper |
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator | 2018-07-13 | Paper |
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck | 2018-05-09 | Paper |
Existence results for \((n-1,1)\)-type nonlocal integral boundary value problems for coupled systems of fractional differential equations at resonance | 2018-04-13 | Paper |
New results on permutation polynomials of the form \((x^{{p}^{m}} - x + \delta)^s + x^{p^m} + x\) over \(\mathbb F_{p^{2m}}\) | 2018-02-19 | Paper |
Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber | 2017-11-16 | Paper |
Several Classes of Boolean Functions with Four-Valued Walsh Spectra | 2017-09-08 | Paper |
New Optimal Quadriphase Sequences With Larger Linear Span | 2017-08-08 | Paper |
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences | 2017-08-08 | Paper |
Period-Different $m$-Sequences With at Most Four-Valued Cross Correlation | 2017-08-08 | Paper |
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks | 2017-07-12 | Paper |
On the Correlation Distributions of the Optimal Quaternary Sequence Family ${\cal U}$ and the Optimal Binary Sequence Family ${\cal V}$ | 2017-07-12 | Paper |
Existence results for a coupled system of fractional differential equations with \(p\)-Laplacian operator and infinite-point boundary conditions | 2017-07-10 | Paper |
Further results on permutation trinomials over finite fields with even characteristic | 2017-05-24 | Paper |
Improved Results on Cryptanalysis of Prime Power RSA | 2017-05-19 | Paper |
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs | 2017-05-16 | Paper |
An Improved Analysis on Three Variants of the RSA Cryptosystem | 2017-05-05 | Paper |
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications | 2017-04-28 | Paper |
Cryptanalysis of Dual RSA | 2017-03-23 | Paper |
On existence results for nonlinear fractional differential equations involving the \(p\)-Laplacian at resonance | 2016-10-19 | Paper |
Existence result for a nonlinear fractional differential equation with integral boundary conditions at resonance | 2016-10-14 | Paper |
Recovering a Sum of Two Squares Decomposition Revisited | 2016-07-25 | Paper |
Some classes of permutation polynomials of the form \((x^{p^m}-x+\delta)^s+x\) over \(\mathbb{F}_{p^{2m}}\) | 2016-05-19 | Paper |
Towards Optimal Bounds for Implicit Factorization Problem | 2016-05-19 | Paper |
Boolean functions with four-valued Walsh spectra | 2016-01-14 | Paper |
Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents | 2016-01-12 | Paper |
Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks | 2015-12-02 | Paper |
Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization | 2015-11-25 | Paper |
The weight distributions of a class of non-primitive cyclic codes with two nonzeros | 2015-11-09 | Paper |
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\) | 2015-10-27 | Paper |
Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity | 2015-10-02 | Paper |
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks | 2015-09-29 | Paper |
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers | 2015-09-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5257679 | 2015-06-29 | Paper |
The weight distributions of two classes of binary cyclic codes | 2015-06-10 | Paper |
Existence result for nonlinear fractional differential equation with \(p\)-Laplacian operator at resonance | 2015-06-02 | Paper |
Families of \(p\)-ary sequences with low correlation and large linear complexity | 2015-04-27 | Paper |
The weight distribution of a family of \(p\)-ary cyclic codes | 2015-04-16 | Paper |
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers | 2015-01-16 | Paper |
Constructing permutations and complete permutations over finite fields via subfield-valued polynomials | 2014-11-21 | Paper |
Existence of solutions for two-point boundary value problem of fractional differential equations at resonance | 2014-11-17 | Paper |
New constructions of APN polynomial functions in odd characteristic | 2014-10-02 | Paper |
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH | 2014-09-04 | Paper |
The weight distributions of two classes of \(p\)-ary cyclic codes | 2014-09-02 | Paper |
Partial Key Exposure Attacks on Takagi’s Variant of RSA | 2014-07-07 | Paper |
CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS | 2014-07-04 | Paper |
Further Improvement of Factoring RSA Moduli with Implicit Hint | 2014-06-24 | Paper |
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher | 2014-06-20 | Paper |
On a class of binomial bent functions over the finite fields of odd characteristic | 2014-03-24 | Paper |
A matrix construction of Boolean functions with maximum algebraic immunity | 2014-03-18 | Paper |
Permutation polynomials with low differential uniformity over finite fields of odd characteristic | 2014-03-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q5399558 | 2014-02-28 | Paper |
Constructing permutation polynomials from piecewise permutations | 2014-02-11 | Paper |
Constructing new differentially 4-uniform permutations from the inverse function | 2014-02-05 | Paper |
Several classes of complete permutation polynomials | 2014-02-05 | Paper |
Periods of polynomials over a Galois ring | 2013-11-22 | Paper |
NEW OPTIMAL FREQUENCY HOPPING SEQUENCE SETS FROM BALANCED NESTED DIFFERENCE PACKINGS OF PARTITION-TYPE | 2013-10-23 | Paper |
Differential Fault Attack on the PRINCE Block Cipher | 2013-10-10 | Paper |
A Class of Binomial Permutation Polynomials | 2013-09-28 | Paper |
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem | 2013-04-08 | Paper |
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function | 2013-01-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q2918322 | 2012-10-05 | Paper |
Two classes of permutation polynomials over finite fields | 2012-08-01 | Paper |
On the reducibility of some composite polynomials over finite fields | 2012-07-31 | Paper |
Cube Cryptanalysis of Hitag2 Stream Cipher | 2012-07-20 | Paper |
Aperiodic correlation of Kasami sequences in the small set | 2012-06-20 | Paper |
Boolean functions with two distinct Walsh coefficients | 2012-06-20 | Paper |
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security | 2012-05-28 | Paper |
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions | 2012-02-11 | Paper |
A construction of hyperbent functions with polynomial trace form | 2012-01-24 | Paper |
New methods for generating permutation polynomials over finite fields | 2011-12-07 | Paper |
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols | 2011-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q3017492 | 2011-07-19 | Paper |
A New Family of Quadriphase Sequences with Low Correlation | 2011-06-08 | Paper |
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme | 2011-05-19 | Paper |
Construction of 1-resilient Boolean functions with optimum algebraic immunity | 2011-04-06 | Paper |
A class of binary cyclic codes with five weights | 2011-02-25 | Paper |
The weight distribution of a class of \(p\)-ary cyclic codes | 2011-02-14 | Paper |
On the generalized large set of Kasami sequences | 2010-12-21 | Paper |
Further crosscorrelation properties of sequences with the decimation factor \({d=\frac{p^n+1}{p+1}-\frac{p^n-1}{2}}\) | 2010-11-22 | Paper |
The large set ofp-ary Kasami sequences | 2010-09-14 | Paper |
New family of binary sequences of period \(4(2^n - 1\)) with low correlation | 2010-08-05 | Paper |
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme | 2010-06-17 | Paper |
Two new permutation polynomials with the form \({\left(x^{2^k}+x+\delta\right)^{s}+x}\) over \({\mathbb{F}_{2^n}}\) | 2010-04-20 | Paper |
A class of rotation symmetric Boolean functions with optimum algebraic immunity | 2010-02-12 | Paper |
Multi-Recipient Public Key Encryption Scheme Based on Weil Pairing | 2010-02-12 | Paper |
Further properties of several classes of Boolean functions with optimum algebraic immunity | 2009-10-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5320557 | 2009-07-22 | Paper |
Some results on skew Hadamard difference sets | 2009-03-31 | Paper |
Analysis of the SMS4 Block Cipher | 2009-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3611004 | 2009-03-06 | Paper |
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting | 2009-02-10 | Paper |
Kipnis-Shamir Attack on HFE Revisited | 2009-02-10 | Paper |
A Class of Nonbinary Codes and Sequence Families | 2009-02-10 | Paper |
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields | 2008-12-21 | Paper |
Generalized Kasami Sequences: The Large Set | 2008-12-21 | Paper |
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences | 2008-11-27 | Paper |
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions | 2008-11-27 | Paper |
Authentication codes and bipartite graphs | 2008-07-11 | Paper |
New Description of SMS4 by an Embedding overGF(28) | 2008-04-11 | Paper |
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols | 2008-04-11 | Paper |
A formula on linear complexity of highest coordinate sequences from maximal periodic sequences over Galois rings | 2008-03-18 | Paper |
A New Family of Gold-Like Sequences | 2008-03-07 | Paper |
Constructions of \(p\)-ary quadratic bent functions | 2008-02-27 | Paper |
Using an efficient hash chain and delaying function to improve an e-lottery scheme | 2007-09-03 | Paper |
Coding and Cryptography | 2007-05-02 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
Kronecker product of two-dimensional arrays | 2006-10-24 | Paper |
Expansion and linear complexity of the coordinate sequences over Galois rings | 2006-07-12 | Paper |
Cryptanalysis of a new signal security system for multimedia data transmission | 2005-10-28 | Paper |
Maximal Periodic Two-Dimensional Arrays Over Galois Rings | 2005-08-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823843 | 2004-10-28 | Paper |
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. | 2004-03-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484043 | 2003-10-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3148113 | 2002-12-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4262680 | 2002-09-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4549145 | 2002-08-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778177 | 2002-03-13 | Paper |
Chrestenson spectral characterization of correlation-immunity of multiple-valued logic functions over \(Z/(m)\) | 2002-02-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721912 | 2001-07-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4509332 | 2001-01-14 | Paper |
Module structure of doubly periodic arrays over finite fields | 2000-12-06 | Paper |
The finite groups of order \(p^2q\) with \(p\)-blocks of defect \(0\) | 1999-09-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840459 | 1998-11-01 | Paper |
Properties of Gröbner bases and applications to doubly periodic arrays | 1998-10-06 | Paper |
Product of spaces of doubly periodic arrays | 1998-01-07 | Paper |