Publication | Date of Publication | Type |
---|
Fast blind rotation for bootstrapping FHEs | 2024-02-06 | Paper |
New method for combining Matsui's bounding conditions with sequential encoding method | 2023-11-07 | Paper |
Security model and modular design of fair authentication key exchange protocols | 2022-10-28 | Paper |
A property-based attestation protocol for TCM | 2022-10-28 | Paper |
On constant-round zero-knowledge proofs of knowledge for NP-relations | 2022-10-28 | Paper |
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V | 2022-09-22 | Paper |
FAN: a lightweight authenticated cryptographic algorithm | 2021-12-20 | Paper |
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System | 2020-07-20 | Paper |
Practical cryptanalysis of Bluetooth encryption with condition masking | 2018-05-28 | Paper |
Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme | 2018-04-20 | Paper |
New Results on Periodic Sequences With Large $k$-Error Linear Complexity | 2017-08-08 | Paper |
The Weight Enumerator of a Class of Cyclic Codes | 2017-07-27 | Paper |
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round | 2017-05-19 | Paper |
Boolean functions and their applications in cryptography | 2016-12-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q2993260 | 2016-08-10 | Paper |
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$ | 2015-12-02 | Paper |
Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP | 2015-11-20 | Paper |
ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication | 2015-11-03 | Paper |
Near Collision Attack on the Grain v1 Stream Cipher | 2015-09-18 | Paper |
A Clustering Approach for Privacy-Preserving in Social Networks | 2015-09-11 | Paper |
Linear Cryptanalysis of FASER128/256 and TriviA-ck | 2015-09-10 | Paper |
Computing Walsh coefficients from the algebraic normal form of a Boolean function | 2014-10-08 | Paper |
ExBLACR: Extending BLACR System | 2014-07-24 | Paper |
On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture | 2014-01-27 | Paper |
Cube Attack on Grain | 2013-11-19 | Paper |
Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking | 2013-09-02 | Paper |
Round-optimal zero-knowledge proofs of knowledge for NP | 2013-08-20 | Paper |
Improved multi-pass fast correlation attacks with applications | 2013-07-03 | Paper |
Cryptanalysis of Helix and Phelix Revisited | 2013-06-28 | Paper |
Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha | 2013-06-04 | Paper |
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures | 2013-03-18 | Paper |
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others | 2013-01-08 | Paper |
Benchmarking for Steganography by Kernel Fisher Discriminant Criterion | 2013-01-07 | Paper |
On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 | 2013-01-07 | Paper |
Combined Public-Key Schemes: The Case of ABE and ABS | 2012-11-06 | Paper |
Fully Secure Doubly-Spatial Encryption under Simple Assumptions | 2012-11-06 | Paper |
An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks | 2012-11-01 | Paper |
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers | 2012-09-10 | Paper |
Black-box testing based on colorful taint analysis | 2012-08-17 | Paper |
Comments on the SM2 Key Exchange Protocol | 2012-07-20 | Paper |
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge | 2011-12-02 | Paper |
ON GUESS AND DETERMINE ANALYSIS OF RABBIT | 2011-10-10 | Paper |
Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost | 2011-09-16 | Paper |
Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher | 2011-07-29 | Paper |
Loiss: A Byte-Oriented Stream Cipher | 2011-06-08 | Paper |
How to Characterize Side-Channel Leakages More Accurately? | 2011-05-19 | Paper |
A Byte-Based Guess and Determine Attack on SOSEMANUK | 2010-12-07 | Paper |
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network | 2010-11-23 | Paper |
Some results on cryptanalysis of SMS4 block cipher | 2010-09-22 | Paper |
Cryptanalysis of the LANE Hash Function | 2009-12-09 | Paper |
An Improved Fast Correlation Attack on Stream Ciphers | 2009-11-03 | Paper |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model | 2009-08-18 | Paper |
A New Client-to-Client Password-Authenticated Key Agreement Protocol | 2009-07-23 | Paper |
Security of Truncated MACs | 2009-04-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610330 | 2009-03-06 | Paper |
Spectral characteristics of the best affine approach of multi-output m-valued logical functions | 2009-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610926 | 2009-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610956 | 2009-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610971 | 2009-03-06 | Paper |
On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences | 2009-02-24 | Paper |
Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/ | 2008-12-21 | Paper |
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields | 2008-12-21 | Paper |
On Quadratic Bent Functions in Polynomial Forms | 2008-12-21 | Paper |
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences | 2008-11-27 | Paper |
On the Unprovable Security of 2-Key XCBC | 2008-07-08 | Paper |
New Results on Impossible Differential Cryptanalysis of Reduced AES | 2008-05-06 | Paper |
Cryptanalysis of the Hash Functions MD4 and RIPEMD | 2008-05-06 | Paper |
New Guess-and-Determine Attack on the Self-Shrinking Generator | 2008-04-24 | Paper |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation | 2008-04-11 | Paper |
Related-Key Differential-Linear Attacks on Reduced AES-192 | 2008-04-11 | Paper |
Short Threshold Signature Schemes Without Random Oracles | 2008-03-17 | Paper |
On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences | 2008-03-14 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 | 2007-11-29 | Paper |
Multi-pass Fast Correlation Attack on Stream Ciphers | 2007-11-29 | Paper |
Survey of information security | 2007-10-12 | Paper |
Modular approach to the design and analysis of password-based security protocols | 2007-10-12 | Paper |
Constructing parallel long-message signcryption scheme from trapdoor permutation | 2007-08-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q3436663 | 2007-05-11 | Paper |
Applied Cryptography and Network Security | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
Theory and Applications of Models of Computation | 2007-04-30 | Paper |
Linear cryptanalysis of NUSH block cipher | 2007-02-20 | Paper |
Cryptanalysis of AW digital signature scheme based on error-correcting codes | 2007-02-20 | Paper |
Collision attack on reduced-round Camellia | 2007-02-20 | Paper |
An attack on hash function HAVAL-128 | 2007-02-20 | Paper |
Information Security and Cryptology | 2006-11-14 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information Security | 2006-10-20 | Paper |
Security analysis of a new stream cipher | 2006-10-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q5491195 | 2006-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5491200 | 2006-10-10 | Paper |
An Arbitrated Quantum Message Signature Scheme | 2006-10-10 | Paper |
Selected Areas in Cryptography | 2006-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q5478246 | 2006-07-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q5469537 | 2006-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5469563 | 2006-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q5718901 | 2006-01-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5718904 | 2006-01-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5718907 | 2006-01-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5715831 | 2006-01-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q5714529 | 2006-01-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q5714532 | 2006-01-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q5714535 | 2006-01-03 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
Cryptanalysis of some signature schemes with message recovery | 2005-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700983 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5700993 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5701001 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q5699432 | 2005-10-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q5315752 | 2005-09-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q5314422 | 2005-09-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q5314426 | 2005-09-05 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4673991 | 2005-05-09 | Paper |
On Lin-Bose problem | 2004-11-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823843 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823909 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4823929 | 2004-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4470906 | 2004-06-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q4466828 | 2004-06-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450658 | 2004-02-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450661 | 2004-02-15 | Paper |
Study on strand space model theory | 2003-11-06 | Paper |
Three characterizations of correlation-immune functions over the rings \(Z_N\) | 2000-08-23 | Paper |
Maximum correlation analysis of nonlinear combining functions | 1998-08-20 | Paper |
Judging of the orthogonal system over rings \(\mathbb{Z}_ N\) | 1998-06-11 | Paper |
A sufficient and necessary condition of judging the independence of Boolean functions system | 1996-09-16 | Paper |
Spectral representation of correspondence of multi-valued logical functions | 1995-11-28 | Paper |