Publication | Date of Publication | Type |
---|
A new key recovery attack on a code-based signature from the Lyubashevsky framework | 2023-10-12 | Paper |
Attack on a code-based signature scheme from QC-LDPC codes | 2023-10-04 | Paper |
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems | 2023-07-07 | Paper |
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences | 2022-07-13 | Paper |
On the design and security of Lee metric McEliece cryptosystems | 2022-03-21 | Paper |
On existence of vectorial bent functions from the $\mathcal{PS}_{ap}$ class | 2022-03-21 | Paper |
On the security of the modified dual-Ouroboros PKE using Gabidulin codes | 2021-12-17 | Paper |
MURAVE: a new rank code-based signature with multiple rank verification | 2021-01-26 | Paper |
An answer to an open problem of Mesnager on bent functions | 2020-08-04 | Paper |
Cryptanalysis on CCA2-secured LRPC-Kronecker cryptosystem | 2020-05-27 | Paper |
Key recovery attacks on some rank metric code-based signatures | 2020-05-06 | Paper |
Cryptanalysis of a rank-based signature with short public keys | 2020-03-27 | Paper |
New rank codes based encryption scheme using partial circulant matrices | 2019-11-07 | Paper |
A new Gabidulin-like code and its application in cryptography | 2019-10-14 | Paper |
On the near prime-order MNT curves | 2019-05-16 | Paper |
On the security and key generation of the ZHFE encryption scheme | 2018-10-24 | Paper |
Key recovery attack on McNie based on low rank parity check codes and its reparation | 2018-10-24 | Paper |
A new encryption scheme based on rank metric codes | 2018-09-26 | Paper |
Orthogonal MDS diffusion matrices over Galois rings | 2018-04-20 | Paper |
On the covering radius of the third order Reed-Muller code \(\mathrm{RM}(3, 7)\) | 2018-01-26 | Paper |
Generating complete Edwards curves | 2017-08-25 | Paper |
A new block cipher based on chaotic tent maps | 2017-08-25 | Paper |
New secondary constructions of differentially 4-uniform permutations over | 2017-07-28 | Paper |
Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting | 2017-07-27 | Paper |
Improved Miller’s Algorithm for Computing Pairings on Edwards Curves | 2017-06-20 | Paper |
Constructing Differentially 4-Uniform Permutations Over <formula formulatype="inline"><tex Notation="TeX">${\BBF}_{2^{2k}}$</tex> </formula> via the Switching Method | 2017-06-08 | Paper |
New differentially 4-uniform permutations by modifying the inverse function on subfields | 2017-02-09 | Paper |
Implicit Quadratic Property of Differentially 4-Uniform Permutations | 2016-12-21 | Paper |
Proof of a conjecture and a bound on the imbalance properties of LFSR subsequences | 2016-11-02 | Paper |
On the second-order nonlinearity of the hidden weighted bit function | 2016-10-07 | Paper |
A Secure Variant of Yasuda, Takagi and Sakurai’s Signature Scheme | 2016-07-25 | Paper |
A new family of differentially 4-uniform permutations over \(\mathbb{F}_{2^{2k}}\) for odd \(k\) | 2016-07-19 | Paper |
Further refinements of Miller's algorithm on Edwards curves | 2016-06-29 | Paper |
New explicit constructions of differentially 4-uniform permutations via special partitions of \(\mathbb{F}_{2^{2 k}}\) | 2016-05-19 | Paper |
MI-T-HFE, A New Multivariate Signature Scheme | 2016-01-12 | Paper |
Breaking an ID-based encryption based on discrete logarithm and factorization problems | 2015-12-01 | Paper |
A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function | 2015-10-16 | Paper |
On Near Prime-Order Elliptic Curves with Small Embedding Degrees | 2015-09-22 | Paper |
Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme | 2015-09-11 | Paper |
Properties of a Family of Cryptographic Boolean Functions | 2015-09-09 | Paper |
A construction of Boolean functions with good cryptographic properties | 2015-06-24 | Paper |
Concatenations of the hidden weighted bit function and their cryptographic properties | 2014-11-28 | Paper |
Six Constructions of Difference Families | 2014-11-13 | Paper |
Cryptographic properties of the hidden weighted bit function | 2014-08-22 | Paper |
A new method to construct Boolean functions with good cryptographic properties | 2014-04-11 | Paper |
On Double Exponentiation for Securing RSA against Fault Analysis | 2014-03-28 | Paper |
Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity | 2014-03-27 | Paper |
On a class of quadratic polynomials with no zeros and its application to APN functions | 2014-02-05 | Paper |
Identity based identification from algebraic coding theory | 2014-01-13 | Paper |
On the Fourier Spectra of New APN Functions | 2013-09-26 | Paper |
Speeding Up Ate Pairing Computation in Affine Coordinates | 2013-06-04 | Paper |
What is your ``birthday elliptic curve? | 2012-11-27 | Paper |
A note on the algebraic immunity of the Maiorana-McFarland class of bent functions | 2012-10-23 | Paper |
New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$ | 2012-09-07 | Paper |
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks | 2012-07-23 | Paper |
Binomial differentially 4 uniform permutations with high nonlinearity | 2012-05-07 | Paper |
Improved Precomputation Scheme for Scalar Multiplication on Elliptic Curves | 2011-12-16 | Paper |
Certificateless cryptography with KGC trust level 3 | 2011-10-10 | Paper |
Certificateless public key encryption: a new generic construction and two pairing-free schemes | 2011-02-21 | Paper |
Dynamic Group Key Exchange Revisited | 2010-12-07 | Paper |
Probabilistic Public Key Encryption with Equality Test | 2010-03-16 | Paper |
Analysis of improved signcryption scheme with key privacy | 2010-01-29 | Paper |
Secure public-key encryption scheme without random oracles | 2008-09-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450775 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149763 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4330643 | 2002-05-14 | Paper |