| Publication | Date of Publication | Type |
|---|
Applications of finite non-abelian simple groups to cryptography in the quantum era La Matematica | 2024-06-28 | Paper |
| Applications of Finite non-Abelian Simple Groups to Cryptography in the Quantum Era | 2023-08-28 | Paper |
Auditable asymmetric password authenticated public key establishment Cryptology and Network Security | 2023-07-28 | Paper |
Group key establishment in a quantum-future scenario Informatica (Vilnius) | 2021-10-06 | Paper |
| scientific article; zbMATH DE number 7274303 (Why is no real title available?) | 2020-11-12 | Paper |
Password-authenticated group key establishment from smooth projective hash functions International Journal of Applied Mathematics and Computer Science | 2020-02-20 | Paper |
Pitfalls in a server-aided authenticated group key establishment Information Sciences | 2019-12-13 | Paper |
Private set intersection: new generic constructions and feasibility results Advances in Mathematics of Communications | 2017-10-12 | Paper |
Cryptanalysis of a key exchange scheme based on block matrices Information Sciences | 2016-07-11 | Paper |
Combined schemes for signature and encryption: the public-key and the identity-based setting Information and Computation | 2016-03-10 | Paper |
Size-hiding in private set intersection: existential results and constructions Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
| Group theoretic cryptography | 2011-11-30 | Paper |
A note on the security of \(\text{MST} _{3}\) Designs, Codes and Cryptography | 2010-05-19 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
In search of mathematical primitives for deriving universal projective hash families Applicable Algebra in Engineering, Communication and Computing | 2008-05-14 | Paper |
(Password) Authenticated Key Establishment: From 2-Party to Group Theory of Cryptography | 2007-08-30 | Paper |
| On ideal and subalgebra coefficients in a class k -algebras | 2007-08-07 | Paper |
Pitfalls in public key cryptosystems based on free partially commutative monoids and groups Applied Mathematics Letters | 2007-06-29 | Paper |
Choosing a leader on a complex network Journal of Computational and Applied Mathematics | 2007-05-11 | Paper |
| Chosen ciphertext attacks as common vulnerability of some group- and polynomial-based encryption schemes | 2007-02-13 | Paper |
Attacking a public key cryptosystem based on tree replacement Discrete Applied Mathematics | 2007-01-09 | Paper |
Weak keys in MST\(_{1}\) Designs, Codes and Cryptography | 2006-05-29 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Towards a uniform description of several group based cryptographic primitives Designs, Codes and Cryptography | 2005-01-17 | Paper |
| scientific article; zbMATH DE number 2102393 (Why is no real title available?) | 2004-09-23 | Paper |
A reaction attack on a public key cryptosystem based on the word problem Applicable Algebra in Engineering, Communication and Computing | 2004-09-22 | Paper |
On Minimal Length Factorizations of Finite Groups Experimental Mathematics | 2004-09-06 | Paper |
On Minimal Length Factorizations of Finite Groups Experimental Mathematics | 2004-09-06 | Paper |
On the security of two public key cryptosystems using non-abelian groups Designs, Codes and Cryptography | 2004-08-16 | Paper |
| scientific article; zbMATH DE number 2086222 (Why is no real title available?) | 2004-08-11 | Paper |
Clouds over a public key cryptosystem based on Lyndon words Information Processing Letters | 2002-07-25 | Paper |
Security of the most significant bits of the Shamir message passing scheme Mathematics of Computation | 2001-12-10 | Paper |
| scientific article; zbMATH DE number 1588479 (Why is no real title available?) | 2001-07-17 | Paper |
| scientific article; zbMATH DE number 1588478 (Why is no real title available?) | 2001-07-17 | Paper |