Publication | Date of Publication | Type |
---|
Lattice-based accumulator with constant time list update and constant time verification | 2023-10-04 | Paper |
Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs | 2023-08-04 | Paper |
PNB-focused differential cryptanalysis of ChaCha stream cipher | 2023-07-26 | Paper |
Message-Restriction-Free Commitment Scheme Based on Lattice Assumption | 2022-08-11 | Paper |
Efficient FPGA design of exception-free generic elliptic curve cryptosystems | 2022-03-21 | Paper |
Secure and compact elliptic curve LR scalar multiplication | 2021-06-08 | Paper |
An improved security analysis on an indeterminate equation public key cryptosystem by evaluation attacks | 2020-07-21 | Paper |
Secure and compact elliptic curve cryptosystems | 2020-05-27 | Paper |
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users | 2019-11-19 | Paper |
A closer look at the Guo-Johansson-Stankovski attack against QC-MDPC codes | 2019-03-29 | Paper |
New iterated RC4 key correlations | 2018-09-26 | Paper |
On the computational complexity of ECDLP for elliptic curves in various forms using index calculus | 2018-06-15 | Paper |
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data | 2018-02-23 | Paper |
Secure and Traceable Framework for Data Circulation | 2016-08-31 | Paper |
Accurate Estimation of the Full Differential Distribution for General Feistel Structures | 2016-07-25 | Paper |
Novel strategies for searching RC4 key collisions | 2016-07-06 | Paper |
How TKIP Induces Biases of Internal States of Generic RC4 | 2015-10-20 | Paper |
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags | 2015-09-29 | Paper |
Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree | 2015-09-22 | Paper |
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA | 2015-09-18 | Paper |
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 | 2015-09-11 | Paper |
SKENO: Secret key encryption with non-interactive opening | 2015-08-07 | Paper |
Dynamic attribute-based signcryption without random oracles | 2012-11-16 | Paper |
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users | 2012-11-01 | Paper |
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks | 2012-06-29 | Paper |
How to Find Short RC4 Colliding Key Pairs | 2011-10-28 | Paper |
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model | 2011-07-29 | Paper |
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments | 2011-07-29 | Paper |
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity | 2011-07-07 | Paper |
Toward Dynamic Attribute-Based Signcryption (Poster) | 2011-07-07 | Paper |
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root | 2011-04-20 | Paper |
An Improved Fast Signature Scheme without Online Multiplication | 2011-04-20 | Paper |
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation | 2010-10-12 | Paper |
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication | 2010-10-12 | Paper |
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | 2010-09-22 | Paper |
Generalized RC4 Key Collisions and Hash Collisions | 2010-09-10 | Paper |
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves | 2010-08-17 | Paper |
New Correlations of RC4 PRGA Using Nonzero-Bit Differences | 2009-06-25 | Paper |
Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA | 2008-05-06 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472405 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472071 | 2004-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450729 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428383 | 2003-09-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418524 | 2003-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788584 | 2003-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536244 | 2003-03-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536663 | 2002-11-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149733 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149760 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2763028 | 2002-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721157 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4505601 | 2000-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249254 | 2000-07-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373641 | 1998-10-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341717 | 1997-08-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314052 | 1995-02-19 | Paper |