| Publication | Date of Publication | Type |
|---|
| On the weakness of ring-LWE mod prime ideal \(\mathfrak{q}\) by trace map | 2024-10-16 | Paper |
| Lattice-based key-value commitment scheme with key-binding and key-hiding properties | 2024-06-05 | Paper |
| A practical forward-secure DualRing | 2024-06-05 | Paper |
| Lattice-based accumulator with constant time list update and constant time verification | 2023-10-04 | Paper |
| Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs | 2023-08-04 | Paper |
| PNB-focused differential cryptanalysis of ChaCha stream cipher | 2023-07-26 | Paper |
| Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity | 2022-12-21 | Paper |
| Message-restriction-free commitment scheme based on lattice assumption | 2022-08-11 | Paper |
| Efficient FPGA design of exception-free generic elliptic curve cryptosystems | 2022-03-21 | Paper |
| Secure and compact elliptic curve LR scalar multiplication | 2021-06-08 | Paper |
| An improved security analysis on an indeterminate equation public key cryptosystem by evaluation attacks | 2020-07-21 | Paper |
| Secure and compact elliptic curve cryptosystems | 2020-05-27 | Paper |
| An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users | 2019-11-19 | Paper |
| A closer look at the Guo-Johansson-Stankovski attack against QC-MDPC codes | 2019-03-29 | Paper |
| New iterated RC4 key correlations | 2018-09-26 | Paper |
| On the computational complexity of ECDLP for elliptic curves in various forms using index calculus | 2018-06-15 | Paper |
| Probably secure keyed-function based authenticated encryption schemes for big data | 2018-02-23 | Paper |
| Secure and traceable framework for data circulation | 2016-08-31 | Paper |
| Accurate estimation of the full differential distribution for general Feistel structures | 2016-07-25 | Paper |
| Novel strategies for searching RC4 key collisions | 2016-07-06 | Paper |
| How TKIP induces biases of internal states of generic RC4 | 2015-10-20 | Paper |
| A provable secure batch authentication scheme for EPCGen2 tags | 2015-09-29 | Paper |
| Extended explicit relations between trace, definition field, and embedding degree | 2015-09-22 | Paper |
| New linear correlations related to state information of RC4 PRGA using IV in WPA | 2015-09-18 | Paper |
| A collision attack on a double-block-length compression function instantiated with round-reduced AES-256 | 2015-09-11 | Paper |
| SKENO: Secret key encryption with non-interactive opening | 2015-08-07 | Paper |
| Dynamic attribute-based signcryption without random oracles | 2012-11-16 | Paper |
| A revocable group signature scheme with the property of hiding the number of revoked users | 2012-11-01 | Paper |
| Lightweight integrity for XOR network coding in wireless sensor networks | 2012-06-29 | Paper |
| How to find short RC4 colliding key pairs | 2011-10-28 | Paper |
| Redesigning group key exchange protocol based on bilinear pairing suitable for various environ\-ments | 2011-07-29 | Paper |
| A new practical key recovery attack on the stream cipher RC4 under related-key model | 2011-07-29 | Paper |
| Toward dynamic attribute-based signcryption (poster) | 2011-07-07 | Paper |
| \(T\)-robust scalable group key exchange protocol with \(O(\log n)\) complexity | 2011-07-07 | Paper |
| A second-price sealed-bid auction with verifiable discriminant of \(p _{0}\)-th root | 2011-04-20 | Paper |
| An improved fast signature scheme without online multiplication | 2011-04-20 | Paper |
| An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation | 2010-10-12 | Paper |
| A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication | 2010-10-12 | Paper |
| A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | 2010-09-22 | Paper |
| Generalized RC4 key collisions and hash collisions | 2010-09-10 | Paper |
| Co-\(Z\) addition formulæ and binary ladders on elliptic curves. (Extended abstract) | 2010-08-17 | Paper |
| New Correlations of RC4 PRGA Using Nonzero-Bit Differences | 2009-06-25 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA | 2008-05-06 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472405 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4472071 | 2004-08-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450729 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4428383 | 2003-09-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418524 | 2003-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4788584 | 2003-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536244 | 2003-03-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536663 | 2002-11-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149733 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149760 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2763028 | 2002-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2721157 | 2001-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4505601 | 2000-09-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249254 | 2000-07-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373641 | 1998-10-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341717 | 1997-08-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4314052 | 1995-02-19 | Paper |