| Publication | Date of Publication | Type |
|---|
| High weight code-based signature scheme from QC-LDPC codes | 2024-05-31 | Paper |
| Depth-measurement trade-off for quantum search on block ciphers | 2024-05-30 | Paper |
| A new key recovery attack on a code-based signature from the Lyubashevsky framework | 2023-10-12 | Paper |
| Attack on a code-based signature scheme from QC-LDPC codes | 2023-10-04 | Paper |
| Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems | 2023-07-07 | Paper |
| Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences | 2022-07-13 | Paper |
| On existence of vectorial bent functions from the $\mathcal{PS}_{ap}$ class | 2022-03-21 | Paper |
| On the design and security of Lee metric McEliece cryptosystems | 2022-03-21 | Paper |
| On the security of the modified dual-Ouroboros PKE using Gabidulin codes | 2021-12-17 | Paper |
| MURAVE: a new rank code-based signature with multiple rank verification | 2021-01-26 | Paper |
| An answer to an open problem of Mesnager on bent functions | 2020-08-04 | Paper |
| Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem | 2020-05-27 | Paper |
| Key recovery attacks on some rank metric code-based signatures | 2020-05-06 | Paper |
| Cryptanalysis of a rank-based signature with short public keys | 2020-03-27 | Paper |
| New rank codes based encryption scheme using partial circulant matrices | 2019-11-07 | Paper |
| A new Gabidulin-like code and its application in cryptography | 2019-10-14 | Paper |
| On the near prime-order MNT curves | 2019-05-16 | Paper |
| Key recovery attack on McNie based on low rank parity check codes and its reparation | 2018-10-24 | Paper |
| On the security and key generation of the ZHFE encryption scheme | 2018-10-24 | Paper |
| A new encryption scheme based on rank metric codes | 2018-09-26 | Paper |
| Orthogonal MDS diffusion matrices over Galois rings | 2018-04-20 | Paper |
| On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\) | 2018-01-26 | Paper |
| Generating complete Edwards curves | 2017-08-25 | Paper |
| A new block cipher based on chaotic tent maps | 2017-08-25 | Paper |
| New secondary constructions of differentially 4-uniform permutations over | 2017-07-28 | Paper |
| Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting | 2017-07-27 | Paper |
| Improved Miller’s Algorithm for Computing Pairings on Edwards Curves | 2017-06-20 | Paper |
| Constructing Differentially 4-Uniform Permutations Over <formula formulatype="inline"><tex Notation="TeX">${\BBF}_{2^{2k}}$</tex> </formula> via the Switching Method | 2017-06-08 | Paper |
| New differentially 4-uniform permutations by modifying the inverse function on subfields | 2017-02-09 | Paper |
| Implicit Quadratic Property of Differentially 4-Uniform Permutations | 2016-12-21 | Paper |
| Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences | 2016-11-02 | Paper |
| On the second-order nonlinearity of the hidden weighted bit function | 2016-10-07 | Paper |
| A Secure Variant of Yasuda, Takagi and Sakurai’s Signature Scheme | 2016-07-25 | Paper |
| A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\) | 2016-07-19 | Paper |
| Further refinements of Miller's algorithm on Edwards curves | 2016-06-29 | Paper |
| New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\) | 2016-05-19 | Paper |
| MI-T-HFE, A New Multivariate Signature Scheme | 2016-01-12 | Paper |
| Breaking an ID-based encryption based on discrete logarithm and factorization problems | 2015-12-01 | Paper |
| A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function | 2015-10-16 | Paper |
| On Near Prime-Order Elliptic Curves with Small Embedding Degrees | 2015-09-22 | Paper |
| Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme | 2015-09-11 | Paper |
| Properties of a Family of Cryptographic Boolean Functions | 2015-09-09 | Paper |
| A construction of Boolean functions with good cryptographic properties | 2015-06-24 | Paper |
| Concatenations of the hidden weighted bit function and their cryptographic properties | 2014-11-28 | Paper |
| Six Constructions of Difference Families | 2014-11-13 | Paper |
| Cryptographic properties of the hidden weighted bit function | 2014-08-22 | Paper |
| A new method to construct Boolean functions with good cryptographic properties | 2014-04-11 | Paper |
| On Double Exponentiation for Securing RSA against Fault Analysis | 2014-03-28 | Paper |
| Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity | 2014-03-27 | Paper |
| On a class of quadratic polynomials with no zeros and its application to APN functions | 2014-02-05 | Paper |
| Identity based identification from algebraic coding theory | 2014-01-13 | Paper |
| On the Fourier spectra of new APN functions | 2013-09-26 | Paper |
| Speeding Up Ate Pairing Computation in Affine Coordinates | 2013-06-04 | Paper |
| What is your ``birthday elliptic curve? | 2012-11-27 | Paper |
| A note on the algebraic immunity of the Maiorana-McFarland class of bent functions | 2012-10-23 | Paper |
| New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$ | 2012-09-07 | Paper |
| SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks | 2012-07-23 | Paper |
| Binomial differentially 4 uniform permutations with high nonlinearity | 2012-05-07 | Paper |
| Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves | 2011-12-16 | Paper |
| Certificateless cryptography with KGC trust level 3 | 2011-10-10 | Paper |
| Certificateless public key encryption: a new generic construction and two pairing-free schemes | 2011-02-21 | Paper |
| Dynamic Group Key Exchange Revisited | 2010-12-07 | Paper |
| Probabilistic Public Key Encryption with Equality Test | 2010-03-16 | Paper |
| Analysis of improved signcryption scheme with key privacy | 2010-01-29 | Paper |
| Secure public-key encryption scheme without random oracles | 2008-09-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450775 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149763 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4330643 | 2002-05-14 | Paper |