| Publication | Date of Publication | Type |
|---|
| Integer syndrome decoding in the presence of noise | 2024-11-26 | Paper |
| Improved algorithm to find equations for algebraic attacks for combiners with memory | 2024-09-18 | Paper |
| DAGS: reloaded revisiting dyadic key encapsulation | 2024-02-23 | Paper |
| A side-channel attack against \textit{Classic McEliece} when loading the Goppa polynomial | 2024-02-02 | Paper |
| Punctured syndrome decoding problem. Efficient side-channel attacks against \textit{Classic McEliece} | 2023-11-16 | Paper |
| Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems | 2023-08-21 | Paper |
| Software implementation of a code-based key encapsulation mechanism from binary QD generalized Srivastava codes | 2023-08-17 | Paper |
| A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes | 2022-01-12 | Paper |
| Message-recovery laser fault injection attack on the \textit{classic McEliece} cryptosystem | 2021-12-08 | Paper |
| Optimized and secure implementation of ROLLO-I | 2021-01-26 | Paper |
| Improvement of binary and non binary statistical decoding algorithm | 2020-07-08 | Paper |
| DAGS: key encapsulation using dyadic GS codes | 2019-01-11 | Paper |
| \(\mathcal{NP}\)-completeness of the Goppa parameterised random binary quasi-dyadic syndrome decoding problem | 2018-08-02 | Paper |
| A pseudorandom number generator based on worst-case lattice problems | 2017-10-27 | Paper |
| On lower bounds for information set decoding over \(\mathbb F_q\) and on the effect of partial knowledge | 2017-07-26 | Paper |
| A New Efficient Threshold Ring Signature Scheme Based on Coding Theory | 2017-07-12 | Paper |
| Efficient Implementation of Hybrid Encryption from Coding Theory | 2017-06-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2965866 | 2017-03-03 | Paper |
| Critical attacks in code-based cryptography | 2016-04-22 | Paper |
| Extended security arguments for signature schemes | 2016-02-19 | Paper |
| Efficient Software Implementations of Code-Based Hash Functions and Stream-Ciphers | 2015-10-01 | Paper |
| Weaknesses in Two RFID Authentication Protocols | 2015-09-21 | Paper |
| Polynomial Structures in Code-Based Cryptography | 2014-01-14 | Paper |
| Improved Zero-Knowledge Identification with Lattices | 2013-02-11 | Paper |
| An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes | 2012-11-01 | Paper |
| Broadcast Attacks against Code-Based Schemes | 2012-10-16 | Paper |
| Improving the Performance of the SYND Stream Cipher | 2012-07-23 | Paper |
| Extended Security Arguments for Signature Schemes | 2012-07-23 | Paper |
| Efficient Implementation of a CCA2-Secure Variant of McEliece Using Generalized Srivastava Codes | 2012-07-20 | Paper |
| Post-quantum cryptography: lattice identification schemes | 2012-07-12 | Paper |
| Quasi-Dyadic CFS Signatures | 2011-07-29 | Paper |
| A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem | 2011-03-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3054959 | 2010-11-05 | Paper |
| Improved Zero-Knowledge Identification with Lattices | 2010-10-12 | Paper |
| A Lattice-Based Threshold Ring Signature Scheme | 2010-08-31 | Paper |
| Post-quantum Cryptography: Code-Based Signatures | 2010-07-13 | Paper |
| Quasi-cyclic codes as codes over rings of matrices | 2010-04-15 | Paper |
| Reducing Key Length of the McEliece Cryptosystem | 2009-07-07 | Paper |
| Identity-based identification and signature schemes using error correcting codes | 2009-03-24 | Paper |
| A New Efficient Threshold Ring Signature Scheme Based on Coding Theory | 2008-11-11 | Paper |
| On Kabatianskii-Krouk-Smeets Signatures | 2007-11-15 | Paper |