| Publication | Date of Publication | Type |
|---|
Shared authentication token secure against replay and weak key attacks Information Processing Letters | 2016-05-26 | Paper |
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
ID-based secret-key cryptography ACM SIGOPS Operating Systems Review | 2008-12-21 | Paper |
Improvement on Ha-Moon Randomized Exponentiation Algorithm Lecture Notes in Computer Science | 2008-03-17 | Paper |
Security reconsideration of the Huang-Wang nominative signature Information Sciences | 2008-03-12 | Paper |
Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements Applied Mathematics and Computation | 2007-09-17 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Checking before output may not be enough against fault-based cryptanalysis IEEE Transactions on Computers | 2007-01-09 | Paper |
Optimal left-to-right binary signed-digit recoding IEEE Transactions on Computers | 2007-01-09 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| scientific article; zbMATH DE number 2085444 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2085442 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2080175 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2079917 (Why is no real title available?) | 2004-08-03 | Paper |
| scientific article; zbMATH DE number 2043315 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 2043314 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 2043329 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1979291 (Why is no real title available?) | 2003-09-11 | Paper |
| scientific article; zbMATH DE number 1950625 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1759668 (Why is no real title available?) | 2002-11-23 | Paper |
| scientific article; zbMATH DE number 1759669 (Why is no real title available?) | 2002-11-23 | Paper |
| scientific article; zbMATH DE number 1808254 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1024011 (Why is no real title available?) | 1998-01-14 | Paper |
| scientific article; zbMATH DE number 1024017 (Why is no real title available?) | 1997-12-08 | Paper |
| scientific article; zbMATH DE number 1024029 (Why is no real title available?) | 1997-09-07 | Paper |
| scientific article; zbMATH DE number 697833 (Why is no real title available?) | 1995-11-28 | Paper |
Multi-exponentiation (cryptographic protocols) IEE Proceedings - Computers and Digital Techniques | 1995-02-23 | Paper |
Improved digital signature suitable for batch verification IEEE Transactions on Computers | 1995-01-01 | Paper |
Improved digital signature algorithm IEEE Transactions on Computers | 1995-01-01 | Paper |
Server-aided honest computation for cryptographic applications Computers & Mathematics with Applications | 1994-05-24 | Paper |
The design of dynamic access control scheme with user authentication Computers & Mathematics with Applications | 1993-06-29 | Paper |