| Publication | Date of Publication | Type |
|---|
| CAPABARA: a combined attack on CAPA | 2024-10-31 | Paper |
| The random fault model | 2024-10-16 | Paper |
| An optimal universal construction for the threshold implementation of bijective S-boxes | 2024-07-19 | Paper |
| On the Sixth International Olympiad in Cryptography NSUCRYPTO | 2022-07-15 | Paper |
| Resilient uniformity: applying resiliency in masking | 2022-04-25 | Paper |
| Practically efficient secure distributed exponentiation without bit-decomposition | 2021-03-17 | Paper |
| PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY | 2021-02-15 | Paper |
| My gadget just cares for me -- how NINA can prove security against combined attacks | 2020-08-05 | Paper |
| Decomposition of permutations in a finite field | 2019-05-15 | Paper |
| Constructions of S-boxes with uniform sharing | 2019-05-15 | Paper |
| CAPA: the spirit of beaver against physical attacks | 2018-09-12 | Paper |
| Masking AES with \(d+1\) shares in hardware | 2018-02-14 | Paper |
| Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm | 2016-04-26 | Paper |
| Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties | 2016-04-19 | Paper |
| Consolidating Masking Schemes | 2015-12-10 | Paper |
| Threshold implementations of small S-boxes | 2015-11-18 | Paper |
| Higher-Order Glitch Resistant Implementation of the PRESENT S-Box | 2015-09-21 | Paper |
| Higher-Order Threshold Implementations | 2015-01-06 | Paper |
| A More Efficient AES Threshold Implementation | 2014-06-24 | Paper |
| Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes | 2012-11-13 | Paper |
| KLEIN: A New Family of Lightweight Block Ciphers | 2012-08-20 | Paper |
| Secure hardware implementation of nonlinear functions in the presence of glitches | 2012-01-18 | Paper |
| Public-Key Encryption with Delegated Search | 2011-06-28 | Paper |
| Privacy Enhanced Access Control by Means of Policy Blinding | 2011-05-19 | Paper |
| Whirlwind: a new cryptographic hash function | 2010-09-16 | Paper |
| Searching Keywords with Wildcards on Encrypted Data | 2010-09-10 | Paper |
| Towards secure and practical MACs for body sensor networks | 2009-12-17 | Paper |
| Strongly multiplicative hierarchical threshold secret sharing | 2009-12-03 | Paper |
| Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches | 2009-03-24 | Paper |
| On Boolean functions with generalized cryptographic properties | 2009-02-09 | Paper |
| Classification of the cosets of \(\text{RM}(1,7)\) in \(\text{RM}(3,7)\) revisited | 2009-02-09 | Paper |
| On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions | 2008-12-21 | Paper |
| Classification of cubic (n-4)-resilient Boolean functions | 2008-12-21 | Paper |
| Using Normal Bases for Compact Hardware Implementations of the AES S-Box | 2008-11-20 | Paper |
| Threshold Implementations Against Side-Channel Attacks and Glitches | 2008-11-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3508962 | 2008-07-01 | Paper |
| On proactive verifiable secret sharing schemes | 2008-07-01 | Paper |
| A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols | 2008-04-24 | Paper |
| Applied Cryptography and Network Security | 2008-02-19 | Paper |
| Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
| Cryptography and Coding | 2007-11-28 | Paper |
| Coding and Cryptography | 2007-05-02 | Paper |
| Security in Communication Networks | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Computing and Combinatorics | 2006-01-11 | Paper |
| Automata, Languages and Programming | 2006-01-10 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4417422 | 2003-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4417425 | 2003-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414276 | 2003-07-24 | Paper |
| On the non-minimal codewords in binary Reed-Muller codes | 2003-06-10 | Paper |
| Improvement of the Delsarte bound for \(\tau\)-designs when it is not the best bound possible | 2003-04-28 | Paper |
| Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces | 2002-11-12 | Paper |
| On the non-minimal codewords of weight \(2d_{\min}\) in the binary Reed-Muller code | 2001-10-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4504299 | 2000-09-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4501013 | 2000-09-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4954425 | 2000-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945348 | 2000-06-07 | Paper |
| Nonexistence of certain spherical designs of odd strengths and cardinalities | 1999-03-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3838752 | 1998-10-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3838680 | 1998-08-13 | Paper |
| On lower bounds on the size of designs in compact symmetric spaces of rank 1 | 1997-09-24 | Paper |