Publication | Date of Publication | Type |
---|
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation | 2024-03-14 | Paper |
Simplified server-aided revocable identity-based encryption from lattices | 2023-07-21 | Paper |
Improved key-recovery attacks on reduced-round WEM-8 | 2022-09-22 | Paper |
Lattice-based linearly homomorphic signature scheme over binary field | 2021-12-15 | Paper |
Accountable identity-based encryption with distributed private key generators | 2021-03-16 | Paper |
D-NTRU: more efficient and average-case IND-CPA secure NTRU variant | 2020-09-08 | Paper |
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease | 2020-07-20 | Paper |
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts | 2020-01-29 | Paper |
Algebraic Attacks Against Several Weak Variants of GVW’13 ABE | 2019-12-10 | Paper |
Signature scheme using the root extraction problem on quaternions | 2019-11-19 | Paper |
A new Gaussian sampling for trapdoor lattices with arbitrary modulus | 2019-10-17 | Paper |
Lattice-based certificateless encryption scheme | 2018-12-19 | Paper |
Sieve method for polynomial linear equivalence | 2018-10-10 | Paper |
Identity-based blind signature from lattices | 2018-05-25 | Paper |
Cryptanalysis of multilinear maps from ideal lattices: revisited | 2017-09-28 | Paper |
Guess and Determine Attacks on Filter Generators—Revisited | 2017-07-12 | Paper |
A New Correlation Attack on Nonlinear Combining Generators | 2017-07-12 | Paper |
Identity-Based Blind Signature from Lattices in Standard Model | 2017-05-05 | Paper |
The termination of the F5 algorithm revisited | 2017-02-10 | Paper |
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions | 2017-02-07 | Paper |
New secondary constructions of bent functions | 2017-01-13 | Paper |
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage | 2016-10-27 | Paper |
Cryptanalysis of GGH Map | 2016-09-09 | Paper |
Gaussian sampling of lattices for cryptographic applications | 2015-11-20 | Paper |
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model | 2015-11-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q3447922 | 2015-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3448011 | 2015-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2943320 | 2015-09-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q2943331 | 2015-09-11 | Paper |
Hard fault analysis of Trivium | 2014-08-01 | Paper |
Chosen ciphertext secure identity-based broadcast encryption in the standard model | 2014-03-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q5399937 | 2014-02-28 | Paper |
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions | 2013-07-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4900748 | 2013-01-24 | Paper |
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree | 2013-01-22 | Paper |
Secondary constructions of bent functions and their enforcement | 2012-11-12 | Paper |
On the value distributions of Walsh spectrums of quadratic plateaued functions | 2012-10-25 | Paper |
Linear spans of optimal sets of frequency hopping sequences | 2012-08-27 | Paper |
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups | 2012-08-24 | Paper |
Fault analysis of Trivium | 2012-03-01 | Paper |
The Termination of Algorithms for Computing Gr\"{o}bner Bases | 2012-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q3110730 | 2012-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3110732 | 2012-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3110813 | 2012-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3110822 | 2012-01-27 | Paper |
Identity-based broadcast encryption with shorter transmissions | 2012-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3098534 | 2011-11-17 | Paper |
LOWER BOUNDS ON THE SECOND ORDER NONLINEARITY OF BOOLEAN FUNCTIONS | 2011-10-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3092090 | 2011-09-15 | Paper |
Weak generalized self-shrinking generators | 2011-08-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q3016681 | 2011-07-19 | Paper |
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits | 2011-05-19 | Paper |
Quadratic compact knapsack public-key cryptosystem | 2010-06-28 | Paper |
New related-key rectangle attacks on reduced AES-192 and AES-256 | 2010-02-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3403240 | 2010-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3403248 | 2010-02-12 | Paper |
Certificateless signcryption scheme in the standard model | 2010-01-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q5319624 | 2009-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q5320267 | 2009-07-22 | Paper |
New Construction of Short Hierarchical ID-Based Signature in the Standard Model | 2009-05-22 | Paper |
On the Computational Efficiency of XTR+ | 2009-04-29 | Paper |
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks | 2009-03-10 | Paper |
NTRUSign With a New Perturbation | 2009-02-24 | Paper |
ID-based threshold proxy signcryption scheme from bilinear pairings | 2009-02-24 | Paper |
Secure Proxy Multi-signature Scheme in the Standard Model | 2009-01-27 | Paper |
Resilient functions over finite fields | 2008-12-21 | Paper |
Generalized Self-Shrinking Generator | 2008-12-21 | Paper |
Computing the k-Error N-Adic Complexity of a Sequence of Period p n | 2008-11-27 | Paper |
Fast S-box security mechanism research based on the polymorphic cipher | 2008-03-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q5431932 | 2008-01-02 | Paper |
Impossible differential cryptanalysis of advanced encryption standard | 2007-10-12 | Paper |
A knapsack-based probabilistic encryption scheme | 2007-10-10 | Paper |
New weak keys in RSA | 2007-06-01 | Paper |
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard | 2007-06-01 | Paper |
An efficient method against side-channel attacks on ECC | 2007-06-01 | Paper |
Improvement of identity-based threshold proxy signature scheme with known signers | 2007-06-01 | Paper |
Fault attack on the balanced shrinking generator | 2007-06-01 | Paper |
Pseudo-randomness of the fourth class of GSS sequences | 2007-02-20 | Paper |
Stream cipher based on GSS sequences | 2007-02-20 | Paper |
Key management using certificate-based cryptosystem in ad hoc networks | 2006-11-15 | Paper |
Information Security and Cryptology | 2006-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q5490832 | 2006-10-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q3373522 | 2006-03-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4271715 | 1994-04-26 | Paper |