Publication | Date of Publication | Type |
---|
Introducing nega-forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra | 2024-04-03 | Paper |
Improved and formal proposal for device-independent quantum private query * | 2024-03-05 | Paper |
Following forrelation -- quantum algorithms in exploring Boolean functions' spectra | 2023-12-14 | Paper |
Analysis of Boolean functions related to binary input binary output two-party nonlocal games | 2023-11-09 | Paper |
Modifying bent functions to obtain the balanced ones with high nonlinearity | 2023-08-14 | Paper |
Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions | 2023-08-14 | Paper |
A proposal for device independent probabilistic quantum oblivious transfer | 2023-08-14 | Paper |
Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks | 2023-05-12 | Paper |
Differential fault attack on Espresso | 2023-05-12 | Paper |
Parity decision tree in classical-quantum separations for certain classes of Boolean functions | 2023-03-17 | Paper |
Differential Fault Attack on Grain v1, ACORN v3 and Lizard | 2022-12-09 | Paper |
Certain Observations on ACORN v3 and the Implications to TMDTO Attacks | 2022-12-09 | Paper |
Improved and practical proposal for measurement device independent quantum dialogue | 2022-11-24 | Paper |
More glimpses of the RC4 internal state array | 2022-07-06 | Paper |
Resolvable block designs in construction of approximate real MUBs that are sparse | 2022-06-13 | Paper |
On the existence and non-existence of some classes of bent-negabent functions | 2022-05-23 | Paper |
Differential Fault Attack on Kreyvium & FLIP | 2022-03-24 | Paper |
Further cryptographic properties of the multiplicative inverse function | 2021-12-07 | Paper |
Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity | 2021-11-02 | Paper |
Quantum Algorithms for Cryptographically Significant Boolean Functions | 2021-07-20 | Paper |
On approximate real mutually unbiased bases in square dimension | 2021-07-13 | Paper |
Glimpses are forever in RC4 amidst the spectre of biases | 2021-05-31 | Paper |
Further clarification on Mantin's digraph repetition bias in RC4 | 2021-01-25 | Paper |
14. Differential fault attack on hardware stream ciphers—a technical survey | 2020-07-27 | Paper |
RC4: non-randomness in the index \(j\) and some results on its cycles | 2020-05-12 | Paper |
Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction | 2020-05-12 | Paper |
Efficient quantum algorithms related to autocorrelation spectrum | 2020-05-12 | Paper |
Device independent quantum key distribution using three-party pseudo-telepathy | 2020-05-12 | Paper |
Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions | 2020-05-12 | Paper |
Analysis on Boolean Function in a Restricted (Biased) Domain | 2020-01-28 | Paper |
The connection between quadratic bent-negabent functions and the Kerdock code | 2019-12-18 | Paper |
Differential fault attack on SIMON with very few faults | 2019-03-29 | Paper |
Tools in analyzing linear approximation for Boolean functions related to FLIP | 2019-03-29 | Paper |
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile | 2019-02-20 | Paper |
On hardware implementation of Tang-maitra Boolean functions | 2019-02-15 | Paper |
Modifying Maiorana--McFarland Type Bent Functions for Good Cryptographic Properties and Efficient Implementation | 2019-02-01 | Paper |
A TMDTO Attack Against Lizard | 2018-09-14 | Paper |
Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query | 2018-08-07 | Paper |
Construction of $n$ -Variable ( $n\equiv 2 \bmod 4$ ) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra $ | 2018-06-27 | Paper |
A Differential Fault Attack on Plantlet | 2018-06-27 | Paper |
A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities | 2018-01-12 | Paper |
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme | 2017-09-20 | Paper |
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform | 2017-07-12 | Paper |
Approximate Integer Common Divisor Problem Relates to Implicit Factorization | 2017-07-12 | Paper |
High-Performance Hardware Implementation for RC4 Stream Cipher | 2017-07-12 | Paper |
A Super-Set of Patterson-Wiedemann Functions – Upper Bounds and Possible Nonlinearities | 2017-06-13 | Paper |
Quantum Algorithms Related to $$\textit{HN}$$ -Transforms of Boolean Functions | 2017-06-01 | Paper |
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions | 2017-05-16 | Paper |
Patterson–Wiedemann Type Functions on 21 Variables With Nonlinearity Greater Than Bent Concatenation Bound | 2017-04-28 | Paper |
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers | 2017-03-27 | Paper |
Redefining the transparency order | 2017-02-10 | Paper |
Observing biases in the state: case studies with Trivium and Trivia-SC | 2017-02-10 | Paper |
Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa} | 2016-05-18 | Paper |
Application of Grover's algorithm to check non-resiliency of a Boolean function | 2016-05-04 | Paper |
Proving TLS-attack related open biases of RC4 | 2015-09-30 | Paper |
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA | 2015-09-18 | Paper |
Differential Power Analysis in Hamming Weight Model: How to Choose among (Extended) Affine Equivalent S-boxes | 2015-09-10 | Paper |
Efficient quantum algorithms to construct arbitrary Dicke states | 2014-12-12 | Paper |
A Differential Fault Attack on the Grain Family under Reasonable Assumptions | 2014-08-20 | Paper |
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher | 2014-04-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2855575 | 2013-10-25 | Paper |
A Differential Fault Attack on MICKEY 2.0 | 2013-10-10 | Paper |
A Chosen IV Related Key Attack on Grain-128a | 2013-06-28 | Paper |
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 | 2013-06-07 | Paper |
Some Results on Related Key-IV Pairs of Grain | 2013-03-13 | Paper |
A Differential Fault Attack on Grain-128a Using MACs | 2013-03-13 | Paper |
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA | 2013-01-28 | Paper |
A Differential Fault Attack on the Grain Family of Stream Ciphers | 2012-11-13 | Paper |
Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents | 2012-11-13 | Paper |
Proof of Empirical RC4 Biases and New Key Correlations | 2012-06-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q3116974 | 2012-02-15 | Paper |
On the Evolution of GGHN Cipher | 2011-12-16 | Paper |
A Theoretical Analysis of the Structure of HC-128 | 2011-11-10 | Paper |
Laced Boolean functions and subset sum problems in finite fields | 2011-08-10 | Paper |
Attack on Broadcast RC4 Revisited | 2011-07-07 | Paper |
Some applications of lattice based root finding techniques | 2011-06-03 | Paper |
Some observations on HC-128 | 2011-04-08 | Paper |
Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions | 2010-12-07 | Paper |
One Byte per Clock: A Novel RC4 Hardware | 2010-12-07 | Paper |
Nega–Hadamard Transform, Bent and Negabent Functions | 2010-09-08 | Paper |
Cryptanalysis of RSA with two decryption exponents | 2010-09-07 | Paper |
Cryptanalysis of RSA with more than one decryption exponent | 2010-09-07 | Paper |
Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits | 2010-05-04 | Paper |
Efficient CRT-RSA Decryption for Small Encryption Exponents | 2010-03-16 | Paper |
Further results on implicit factoring in polynomial time | 2010-03-10 | Paper |
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling | 2010-01-14 | Paper |
On biases of permutation and keystream bytes of RC4 towards the secret key | 2009-10-26 | Paper |
On affine (non)equivalence of Boolean functions | 2009-08-10 | Paper |
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS | 2009-08-06 | Paper |
A constructive count of rotation symmetric functions | 2009-07-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3635570 | 2009-07-06 | Paper |
Results on rotation symmetric bent functions | 2009-06-19 | Paper |
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key | 2009-03-31 | Paper |
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros | 2009-03-31 | Paper |
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors | 2009-03-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q3597523 | 2009-02-09 | Paper |
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin | 2009-01-22 | Paper |
A New Class of Weak Encryption Exponents in RSA | 2009-01-22 | Paper |
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction | 2008-12-21 | Paper |
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions | 2008-12-21 | Paper |
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class | 2008-12-21 | Paper |
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators | 2008-11-27 | Paper |
Revisiting Wiener’s Attack – New Weak Keys in RSA | 2008-11-20 | Paper |
A complete characterization of the evolution of RC4 pseudo random generation algorithm | 2008-11-06 | Paper |
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 | 2008-09-18 | Paper |
Rotation symmetric Boolean functions-count and cryptographic properties | 2008-09-10 | Paper |
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck | 2008-07-08 | Paper |
On Non-randomness of the Permutation After RC4 Key Scheduling | 2008-04-17 | Paper |
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity | 2008-04-17 | Paper |
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240 | 2008-04-11 | Paper |
Permutation After RC4 Key Scheduling Reveals the Secret Key | 2008-03-25 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Balancedness and correlation immunity of symmetric Boolean functions | 2007-09-21 | Paper |
Exact quantum algorithm to distinguish Boolean functions of different weights | 2007-08-09 | Paper |
Patterson-Wiedemann Construction Revisited | 2007-05-29 | Paper |
Rotation Symmetric Boolean Functions –; Count and Cryptographic Properties | 2007-05-29 | Paper |
Balancedness and Correlation Immunity of Symmetric Boolean Functions | 2007-05-29 | Paper |
Basic theory in construction of Boolean functions with maximum possible annihilator immunity | 2006-11-22 | Paper |
Information Security | 2006-10-20 | Paper |
Distributed Computing – IWDC 2005 | 2006-10-10 | Paper |
Patterson-Wiedemann construction revisited | 2006-08-04 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
A Maiorana--McFarland type construction for resilient Boolean functions on \(n\) variables (\(n\) even) with nonlinearity \(>2^{n-1}-2^{n/2}+2^{n/2-2}\) | 2006-04-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374931 | 2006-03-01 | Paper |
Fast Software Encryption | 2005-12-27 | Paper |
Fast Software Encryption | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Results on multiples of primitive polynomials and their products over GF(2) | 2005-09-22 | Paper |
Further constructions of resilient Boolean functions with very high nonlinearity | 2005-05-11 | Paper |
Linear codes in generalized construction of resilient functions with very high nonlinearity | 2005-05-11 | Paper |
Maximum nonlinearity of symmetric Boolean functions on odd number of variables | 2005-05-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4736422 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473568 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428344 | 2003-09-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428348 | 2003-09-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417400 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417410 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417411 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413864 | 2003-07-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788563 | 2003-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788572 | 2003-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788580 | 2003-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4788587 | 2003-05-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4798533 | 2003-03-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797807 | 2003-03-09 | Paper |
Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics. | 2003-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536822 | 2002-10-07 | Paper |
Modifications of Patterson-Wiedemann functions for cryptographic applications | 2002-08-04 | Paper |
Hamming weights of correlation immune Boolean functions | 2002-07-25 | Paper |
Cryptographically significant Boolean functions with five valued Walsh spectra | 2002-07-15 | Paper |
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes | 2002-05-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4421639 | 2002-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741443 | 2001-10-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741405 | 2001-10-14 | Paper |
Ciphertext Only Attack on LFSR Based Encryption Scheme | 2000-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250625 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941856 | 1999-01-01 | Paper |