Publication | Date of Publication | Type |
---|
Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 | 2023-08-25 | Paper |
Key structures: improved related-key boomerang attack against the full AES-256 | 2023-07-26 | Paper |
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing | 2023-06-12 | Paper |
Triangulating rebound attack on AES-like hashing | 2023-06-12 | Paper |
Towards closing the security gap of Tweak-aNd-Tweak (TNT) | 2023-03-21 | Paper |
Sliding mode control for networked control systems under DoS attacks via an event-triggered scheme | 2023-03-07 | Paper |
Consensus tracking control for nonlinear multiagent systems with asymmetric state constraints and input delays | 2022-11-09 | Paper |
Neural network-based adaptive finite-time tracking control of switched nonlinear systems with time-varying delay | 2022-06-03 | Paper |
TNT: how to tweak a block cipher | 2022-03-23 | Paper |
Dynamic event-triggered control design for a class of \(p\)-normal nonlinear time-delay systems with actuator failures | 2022-03-04 | Paper |
New Constructions of Complete Permutations | 2022-02-17 | Paper |
Disturbance-observer-based sampled-data adaptive output feedback control for a class of uncertain nonlinear systems | 2022-02-08 | Paper |
Stabilisation for positive switched T-S fuzzy delayed systems under standard L1 and L∞ performance | 2022-02-04 | Paper |
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing | 2021-12-08 | Paper |
Distributed set-membership filtering for time-varying systems: a coding-decoding-based approach | 2021-11-18 | Paper |
M-estimation based sparse grid quadrature filter and stochastic stability analysis | 2021-10-21 | Paper |
Global adaptive finite‐time stabilization for a class of p‐normal nonlinear systems via an event‐triggered strategy | 2021-05-31 | Paper |
Prediction of membrane protein types from sequences and position-specific scoring matrices | 2021-01-21 | Paper |
Simultaneous variable selection and class fusion for high-dimensional linear discriminant analysis | 2020-08-04 | Paper |
Generic attacks on hash combiners | 2020-06-15 | Paper |
Practical collision attacks against round-reduced SHA-3 | 2020-03-03 | Paper |
Consensus control of networked multi-agent systems based on a novel hybrid transmission strategy | 2019-07-02 | Paper |
In Vivo Intravascular Ultrasound-Based 3D Thin-Walled Model for Human Coronary Plaque Progression Study: Transforming Research to Potential Commercialization | 2019-03-27 | Paper |
Sampled‐data leader‐following consensus of second‐order nonlinear multiagent systems without velocity measurements | 2019-02-28 | Paper |
Displacement and stress analysis of thin plate for cement concrete pavement | 2019-02-08 | Paper |
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions | 2019-01-23 | Paper |
Global sampled-data output feedback stabilization for a class of stochastic nonlinear systems with time-varying delay | 2019-01-15 | Paper |
Adaptive practical stabilization of a class of uncertain nonlinear systems via sampled-data control | 2018-10-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4687940 | 2018-10-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4688317 | 2018-10-22 | Paper |
Optimal formation control and collision avoidance in environment with multiple rectangle obstacles | 2018-10-18 | Paper |
Robust adaptive attitude control for flexible spacecraft in the presence of SGCMG friction nonlinearity | 2018-08-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4574735 | 2018-07-18 | Paper |
Sampled‐data control of a class of uncertain switched nonlinear systems in nonstrict‐feedback form | 2018-05-31 | Paper |
Class-specific variable selection for multicategory support vector machines | 2018-03-15 | Paper |
Functional graph revisited: updates on (second) preimage attacks on hash combiners | 2017-11-15 | Paper |
Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak} | 2017-11-15 | Paper |
New Collision Attacks on Round-Reduced Keccak | 2017-06-23 | Paper |
A risk assessment approach for failure mode and effects analysis based on intuitionistic fuzzy sets and evidence theory | 2017-05-19 | Paper |
Adaptive finite-time control for a class of switched nonlinear systems using multiple Lyapunov functions | 2017-04-18 | Paper |
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak | 2017-02-01 | Paper |
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers | 2017-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3180161 | 2017-01-06 | Paper |
New Insights on AES-Like SPN Ciphers | 2016-11-30 | Paper |
Adaptive finite-time control for uncertain nonlinear systems with application to mechanical systems | 2016-11-09 | Paper |
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis | 2016-09-09 | Paper |
Generalized integration operators from mixed-norm to Zygmund-type spaces | 2016-09-08 | Paper |
Extended meet-in-the-middle attacks on some Feistel constructions | 2016-07-21 | Paper |
Adaptive finite-time fault-tolerant consensus protocols for multiple mechanical systems | 2016-05-19 | Paper |
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function | 2016-04-13 | Paper |
High-order sliding mode-based synchronous control of a novel stair-climbing wheelchair robot | 2016-02-29 | Paper |
Identifying functional co‐activation patterns in neuroimaging studies via poisson graphical models | 2016-01-21 | Paper |
Discrete second-order sliding mode adaptive controller based on characteristic model for servo systems | 2015-11-19 | Paper |
Estimating heterogeneous graphical models for discrete data with an application to roll call voting | 2015-10-28 | Paper |
Implementing Lightweight Block Ciphers on x86 Architectures | 2015-10-01 | Paper |
CLOC: Authenticated Encryption for Short Input | 2015-09-18 | Paper |
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds | 2015-09-18 | Paper |
Long-term passive distance-bounded relative motion in the presence of \(J_2\) perturbations | 2015-06-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5497911 | 2015-02-11 | Paper |
Meet-in-the-Middle Attacks on Generic Feistel Constructions | 2015-01-16 | Paper |
An improved preimage attack against \texttt{HAVAL-3} | 2014-12-09 | Paper |
Hybrid multicriteria group decision making method for information system project selection based on intuitionistic fuzzy theory | 2014-11-24 | Paper |
Hybrid multiattribute group decision making based on intuitionistic fuzzy information and GRA method | 2014-11-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q2923542 | 2014-11-03 | Paper |
Updates on Generic Attacks against HMAC and NMAC | 2014-08-07 | Paper |
Analysis of BLAKE2 | 2014-03-28 | Paper |
Cryptanalysis of HMAC/NMAC-Whirlpool | 2013-12-10 | Paper |
Robust finite-time \(H_{\infty}\) control for impulsive switched nonlinear systems with state delay | 2013-06-11 | Paper |
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others | 2013-01-08 | Paper |
Unaligned Rebound Attack: Application to Keccak | 2013-01-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q2917060 | 2012-10-05 | Paper |
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks | 2012-07-23 | Paper |
The LED Block Cipher | 2011-10-07 | Paper |
The PHOTON Family of Lightweight Hash Functions | 2011-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3014728 | 2011-07-19 | Paper |
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) | 2011-07-07 | Paper |
Joint estimation of multiple graphical models | 2011-04-19 | Paper |
Deterministic Differential Properties of the Compression Function of BMW | 2011-03-15 | Paper |
Exothermic process of cast-in-place pile foundation and its thermal agitation of the frozen ground under a long dry bridge on the Qinghai-Tibet railway | 2011-02-02 | Paper |
Pairwise Variable Selection for High-Dimensional Model-Based Clustering | 2010-12-21 | Paper |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | 2010-12-07 | Paper |
Differential and Invertibility Properties of BLAKE | 2010-07-13 | Paper |
Preimages for Step-Reduced SHA-2 | 2009-12-15 | Paper |
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 | 2009-12-09 | Paper |
Cryptanalysis of the LAKE Hash Family | 2009-08-11 | Paper |
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits | 2009-01-09 | Paper |
Cryptanalysis of LASH | 2008-09-18 | Paper |
On the Improvement of the BDF Attack on LSBS-RSA | 2008-07-08 | Paper |
Fractal modelling of off-road terrain oriented to vehicle virtual test | 2007-09-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3438034 | 2007-05-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3421107 | 2007-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3375011 | 2006-03-01 | Paper |
A two-stage algorithm of adaptive model-based parameter estimation and its application in the fast calculation of Green's function in multi-layer soils | 2006-01-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q5701037 | 2005-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4543360 | 2002-11-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q2764411 | 2002-03-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q2749402 | 2001-10-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4936852 | 2000-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4710403 | 1992-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3351158 | 1991-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3352852 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3815144 | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4203722 | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3792500 | 1987-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3766734 | 1986-01-01 | Paper |