Publication | Date of Publication | Type |
---|
Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis | 2023-01-25 | Paper |
Beacon based authentication | 2021-12-20 | Paper |
Security of the blockchain against long delay attack | 2019-01-23 | Paper |
How to construct efficient signcryption schemes on elliptic curves | 2016-06-09 | Paper |
On the Construction of Public Key Encryption with Sender Recovery | 2015-05-19 | Paper |
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption | 2014-12-09 | Paper |
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions | 2014-08-20 | Paper |
A NEW CONSTRUCTION OF IDENTITY-BASED SIGNCRYPTION WITHOUT RANDOM ORACLES | 2014-07-04 | Paper |
Public Key Cryptography for Mobile Cloud | 2013-06-28 | Paper |
New Impossible Differential Attack on SAFER + and SAFER + + | 2013-06-04 | Paper |
Public key encryption without random oracle made truly practical | 2012-10-19 | Paper |
Public Key Encryption for the Forgetful | 2012-06-08 | Paper |
A Single Key Pair is Adequate for the Zheng Signcryption | 2011-07-07 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Introduction to the Special Issue on Information Theoretic Security | 2009-02-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q3597530 | 2009-02-09 | Paper |
On Algebraic Immunity and Annihilators | 2008-05-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3592878 | 2007-09-24 | Paper |
Formal proofs for the security of signcryption | 2007-05-03 | Paper |
The generalized XOR lemma | 2005-02-09 | Paper |
On the security of RSA with primes sharing least-significant bits | 2005-02-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737262 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043927 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043928 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472407 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4472429 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4452562 | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4452567 | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450727 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418540 | 2003-08-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412982 | 2003-07-17 | Paper |
Connections among nonlinearity, avalanche and correlation immunity | 2003-05-14 | Paper |
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) | 2002-11-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724423 | 2002-11-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536659 | 2002-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4949329 | 2002-09-01 | Paper |
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks | 2002-08-28 | Paper |
On plateaued functions | 2002-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501494 | 2002-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724581 | 2002-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945391 | 2002-04-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707409 | 2002-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502513 | 2002-01-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502490 | 2002-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q2762892 | 2002-01-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q2762759 | 2002-01-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757251 | 2001-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707441 | 2001-08-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721122 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4942036 | 2001-05-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4520836 | 2001-02-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4520278 | 2001-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4520283 | 2001-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4520313 | 2001-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2765162 | 2001-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501487 | 2000-09-04 | Paper |
Restriction, terms and nonlinearity of Boolean functions | 2000-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4495078 | 2000-08-10 | Paper |
Relating differential distribution tables to other properties of substitution boxes | 2000-06-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4942245 | 2000-05-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945397 | 2000-03-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4940711 | 2000-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4934718 | 2000-01-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251023 | 1999-11-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251030 | 1999-11-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4263422 | 1999-09-22 | Paper |
The Nonhomomorphicity of Boolean Functions | 1999-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3839179 | 1998-08-13 | Paper |
Cryptographically resilient functions | 1998-07-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373627 | 1998-05-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365749 | 1998-01-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364550 | 1998-01-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840096 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365756 | 1997-12-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341784 | 1997-10-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341675 | 1997-07-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341677 | 1997-07-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341732 | 1997-07-20 | Paper |
On key agreement protocols based on tamper-proof hardware | 1997-02-28 | Paper |
Characterizing the structures of cryptographic functions satisfying the propagation criterion for almost all vectors | 1996-05-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4942250 | 1996-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4318702 | 1995-08-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4325286 | 1995-08-24 | Paper |
Nonlinearity and propagation characteristics of balanced Boolean functions | 1995-08-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314020 | 1995-02-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314021 | 1994-11-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279582 | 1994-09-20 | Paper |
Improving the strict avalanche characteristics of cryptographic functions | 1994-05-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3356234 | 1991-01-01 | Paper |
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3359634 | 1990-01-01 | Paper |