| Publication | Date of Publication | Type |
|---|
| New methods for bounding the length of impossible differentials of SPN block ciphers | 2025-01-23 | Paper |
| NEV: faster and smaller NTRU encryption using vector decoding | 2024-08-30 | Paper |
| Fast blind rotation for bootstrapping FHEs | 2024-02-06 | Paper |
| New method for combining Matsui's bounding conditions with sequential encoding method | 2023-11-07 | Paper |
| Security model and modular design of fair authentication key exchange protocols | 2022-10-28 | Paper |
| A property-based attestation protocol for TCM | 2022-10-28 | Paper |
| On constant-round zero-knowledge proofs of knowledge for NP-relations | 2022-10-28 | Paper |
| Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V | 2022-09-22 | Paper |
| FAN: a lightweight authenticated cryptographic algorithm | 2021-12-20 | Paper |
| Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System | 2020-07-20 | Paper |
| Practical cryptanalysis of Bluetooth encryption with condition masking | 2018-05-28 | Paper |
| Cryptanalysis and improvement of a strongly unforgeable identity-based signature scheme | 2018-04-20 | Paper |
| New Results on Periodic Sequences With Large $k$-Error Linear Complexity | 2017-08-08 | Paper |
| The Weight Enumerator of a Class of Cyclic Codes | 2017-07-27 | Paper |
| Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round | 2017-05-19 | Paper |
| Boolean functions and their applications in cryptography | 2016-12-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2993260 | 2016-08-10 | Paper |
| Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$ | 2015-12-02 | Paper |
| Constant-round zero-knowledge proofs of knowledge with strict polynomial-time extractors for NP | 2015-11-20 | Paper |
| ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication | 2015-11-03 | Paper |
| Near Collision Attack on the Grain v1 Stream Cipher | 2015-09-18 | Paper |
| A Clustering Approach for Privacy-Preserving in Social Networks | 2015-09-11 | Paper |
| Linear Cryptanalysis of FASER128/256 and TriviA-ck | 2015-09-10 | Paper |
| Computing Walsh coefficients from the algebraic normal form of a Boolean function | 2014-10-08 | Paper |
| ExBLACR: Extending BLACR System | 2014-07-24 | Paper |
| On the nonexistence of nontrivial small cycles of the \(\mu\) function in \(3x+1\) conjecture | 2014-01-27 | Paper |
| Cube attack on grain | 2013-11-19 | Paper |
| Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking | 2013-09-02 | Paper |
| Round-optimal zero-knowledge proofs of knowledge for NP | 2013-08-20 | Paper |
| Improved multi-pass fast correlation attacks with applications | 2013-07-03 | Paper |
| Cryptanalysis of Helix and Phelix Revisited | 2013-06-28 | Paper |
| Improved key recovery attacks on reduced-round Salsa20 and ChaCha | 2013-06-04 | Paper |
| Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures | 2013-03-18 | Paper |
| (Pseudo) preimage attack on round-reduced Grøstl hash function and others | 2013-01-08 | Paper |
| Benchmarking for Steganography by Kernel Fisher Discriminant Criterion | 2013-01-07 | Paper |
| On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3 | 2013-01-07 | Paper |
| Combined public-key schemes: the case of ABE and ABS | 2012-11-06 | Paper |
| Fully secure doubly-spatial encryption under simple assumptions | 2012-11-06 | Paper |
| An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks | 2012-11-01 | Paper |
| Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers | 2012-09-10 | Paper |
| Black-box testing based on colorful taint analysis | 2012-08-17 | Paper |
| Comments on the SM2 key exchange protocol | 2012-07-20 | Paper |
| Resettable cryptography in constant rounds -- the case of zero knowledge | 2011-12-02 | Paper |
| On guess and determine analysis of Rabbit | 2011-10-10 | Paper |
| Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost | 2011-09-16 | Paper |
| Hyper-Sbox view of AES-like permutations: a generalized distinguisher | 2011-07-29 | Paper |
| Loiss: A Byte-Oriented Stream Cipher | 2011-06-08 | Paper |
| How to characterize side-channel leakages more accurately? | 2011-05-19 | Paper |
| A byte-based guess and determine attack on SOSEMANUK | 2010-12-07 | Paper |
| An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network | 2010-11-23 | Paper |
| Some results on cryptanalysis of SMS4 block cipher | 2010-09-22 | Paper |
| Cryptanalysis of the LANE hash function | 2009-12-09 | Paper |
| An Improved Fast Correlation Attack on Stream Ciphers | 2009-11-03 | Paper |
| Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model | 2009-08-18 | Paper |
| A New Client-to-Client Password-Authenticated Key Agreement Protocol | 2009-07-23 | Paper |
| Security of Truncated MACs | 2009-04-29 | Paper |
| Correlation functions of multioutput \(m\)-valued logical functions and relation between correlation functions and spectra | 2009-03-06 | Paper |
| Spectral characteristics of the best affine approach of multi-output m-valued logical functions | 2009-03-06 | Paper |
| Fuzzy decision tree based inference techniques for network forensic analysis | 2009-03-06 | Paper |
| Global timestamp serialization in multi-level multi-version DBMS | 2009-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610971 | 2009-03-06 | Paper |
| On the $2$-Adic Complexity and the $k$-Error $2$-Adic Complexity of Periodic Binary Sequences | 2009-02-24 | Paper |
| On Quadratic Bent Functions in Polynomial Forms | 2008-12-21 | Paper |
| On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields | 2008-12-21 | Paper |
| Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/ | 2008-12-21 | Paper |
| On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences | 2008-11-27 | Paper |
| On the Unprovable Security of 2-Key XCBC | 2008-07-08 | Paper |
| Cryptanalysis of the Hash Functions MD4 and RIPEMD | 2008-05-06 | Paper |
| New Results on Impossible Differential Cryptanalysis of Reduced AES | 2008-05-06 | Paper |
| New Guess-and-Determine Attack on the Self-Shrinking Generator | 2008-04-24 | Paper |
| Symmetric Nonce Respecting Security Model and the MEM Mode of Operation | 2008-04-11 | Paper |
| Related-Key Differential-Linear Attacks on Reduced AES-192 | 2008-04-11 | Paper |
| Short Threshold Signature Schemes Without Random Oracles | 2008-03-17 | Paper |
| On the 2-Adic Complexity and the k-Error 2-Adic Complexity of Periodic Binary Sequences | 2008-03-14 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Multi-pass Fast Correlation Attack on Stream Ciphers | 2007-11-29 | Paper |
| Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 | 2007-11-29 | Paper |
| Survey of information security | 2007-10-12 | Paper |
| Modular approach to the design and analysis of password-based security protocols | 2007-10-12 | Paper |
| Constructing parallel long-message signcryption scheme from trapdoor permutation | 2007-08-31 | Paper |
| Spectral characteristics of multi-output \(m\)-valued logical functions | 2007-05-11 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Theory and Applications of Models of Computation | 2007-04-30 | Paper |
| An attack on hash function HAVAL-128 | 2007-02-20 | Paper |
| Linear cryptanalysis of NUSH block cipher | 2007-02-20 | Paper |
| Cryptanalysis of AW digital signature scheme based on error-correcting codes | 2007-02-20 | Paper |
| Collision attack on reduced-round Camellia | 2007-02-20 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information Security | 2006-10-20 | Paper |
| Security analysis of a new stream cipher | 2006-10-11 | Paper |
| An Arbitrated Quantum Message Signature Scheme | 2006-10-10 | Paper |
| Pairwise key agreement protocols based on the Weil pairing | 2006-10-10 | Paper |
| Analysis and improvement of a security-provable mutually authenticated key agreement | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Quantum secure direct communication using quantum Calderbank-Shor-Steane error correcting codes | 2006-07-12 | Paper |
| Ownership proofs of digital works based on secure multiparty computation | 2006-05-19 | Paper |
| Cryptanalysis of the TAE mode and its improvement | 2006-05-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5718904 | 2006-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5718907 | 2006-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5718901 | 2006-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5715831 | 2006-01-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5714532 | 2006-01-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5714535 | 2006-01-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5714529 | 2006-01-03 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Cryptanalysis of some signature schemes with message recovery | 2005-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5701001 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700993 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700983 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5699432 | 2005-10-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5315752 | 2005-09-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5314422 | 2005-09-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5314426 | 2005-09-05 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4673991 | 2005-05-09 | Paper |
| On Lin-Bose problem | 2004-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823929 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823843 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4823909 | 2004-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4470906 | 2004-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4466828 | 2004-06-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450658 | 2004-02-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450661 | 2004-02-15 | Paper |
| Study on strand space model theory | 2003-11-06 | Paper |
| Three characterizations of correlation-immune functions over the rings \(Z_N\) | 2000-08-23 | Paper |
| Maximum correlation analysis of nonlinear combining functions | 1998-08-20 | Paper |
| Judging of the orthogonal system over rings \(\mathbb{Z}_ N\) | 1998-06-11 | Paper |
| A sufficient and necessary condition of judging the independence of Boolean functions system | 1996-09-16 | Paper |
| Spectral representation of correspondence of multi-valued logical functions | 1995-11-28 | Paper |