| Publication | Date of Publication | Type |
|---|
| Achieving pairing-free aggregate signatures using pre-communication between signers | 2023-03-21 | Paper |
| Efficient private PEZ protocols for symmetric functions | 2020-04-30 | Paper |
| Probabilistic generation of trapdoors: reducing information leakage of searchable symmetric encryption | 2018-10-26 | Paper |
| Efficient card-based cryptographic protocols for millionaires' problem utilizing private permutations | 2018-10-26 | Paper |
| Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes | 2018-10-24 | Paper |
| Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography | 2018-06-27 | Paper |
| Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations | 2018-03-16 | Paper |
| Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency | 2016-05-02 | Paper |
| Dynamic threshold public-key encryption with decryption consistency from static assumptions | 2015-10-20 | Paper |
| Improved Indifferentiable Security Analysis of PHOTON | 2014-10-14 | Paper |
| Factorization of Square-Free Integers with High Bits Known | 2014-08-21 | Paper |
| How to construct sufficient conditions for hash functions | 2014-08-21 | Paper |
| Reset indifferentiability from weakened random oracle salvages one-pass hash functions | 2014-07-07 | Paper |
| Constant rounds almost linear complexity multi-party computation for prefix sum | 2014-06-24 | Paper |
| An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl | 2014-03-28 | Paper |
| Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher | 2013-06-04 | Paper |
| An extension of fault sensitivity analysis based on clockwise collision | 2013-05-28 | Paper |
| Boomerang distinguishers for full HAS-160 compression function | 2013-04-04 | Paper |
| Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function | 2013-04-04 | Paper |
| Three-subset meet-in-the-middle attack on reduced XTEA | 2012-07-23 | Paper |
| On the Security of Dynamic Group Signatures: Preventing Signature Hijacking | 2012-07-20 | Paper |
| New truncated differential cryptanalysis on 3D block cipher | 2012-06-29 | Paper |
| Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting | 2011-12-16 | Paper |
| Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity | 2011-11-10 | Paper |
| Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches | 2011-10-07 | Paper |
| Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model | 2011-09-16 | Paper |
| Rigorous security requirements for designated verifier signatures | 2011-07-29 | Paper |
| (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach | 2011-02-11 | Paper |
| Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl | 2010-12-07 | Paper |
| Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness | 2010-03-16 | Paper |
| How to confirm cryptosystems security: the original Merkle-Damgård is still alive! | 2009-12-15 | Paper |
| Bit-Free Collision: Application to APOP Attack | 2009-10-28 | Paper |
| Fault Analysis Attack against an AES Prototype Chip Using RSL | 2009-04-29 | Paper |
| A New Strategy for Finding a Differential Path of SHA-1 | 2009-03-06 | Paper |
| Sanitizable and Deletable Signature | 2009-02-24 | Paper |
| Leaky Random Oracle (Extended Abstract) | 2009-01-27 | Paper |
| New Message Difference for MD4 | 2008-09-16 | Paper |
| Provably Secure Electronic Cash Based on Blind Multisignature Schemes | 2008-09-09 | Paper |
| Formal Security Model of Multisignatures | 2008-06-17 | Paper |
| Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures | 2008-06-13 | Paper |
| Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function | 2008-06-13 | Paper |
| Improved Collision Search for SHA-0 | 2008-04-24 | Paper |
| Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack | 2008-04-24 | Paper |
| Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks | 2008-04-17 | Paper |
| New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | 2008-04-15 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol | 2007-09-04 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| A quantum algorithm using NMR computers to break secret-key cryptosystems | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4940675 | 2000-03-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250823 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4251009 | 1999-10-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249344 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373637 | 1998-02-16 | Paper |
| A practical secret voting scheme for large scale elections | 1998-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4343431 | 1997-08-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341747 | 1997-06-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4314032 | 1995-11-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4314022 | 1994-11-30 | Paper |
| How to Utilize the Randomness of Zero-Knowledge Proofs | 1994-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4279687 | 1994-02-22 | Paper |
| Universal Electronic Cash | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4036887 | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4035718 | 1993-05-18 | Paper |
| Interactive Bi-Proof Systems and Undeniable Signature Schemes | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4036901 | 1993-05-18 | Paper |
| Direct Zero Knowledge Proofs of Computational Power in Five Rounds | 1993-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3197311 | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3358226 | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3210170 | 1990-01-01 | Paper |