| Publication | Date of Publication | Type |
|---|
| On construction of resilient functions | 2024-07-11 | Paper |
| Dynamic tree-based authenticated group key exchange protocol | 2022-10-28 | Paper |
| Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions | 2018-06-27 | Paper |
| On the construction of differentially 4-uniform involutions | 2017-09-05 | Paper |
| Comments on "Monomial Bent Functions" [Feb 2006 738-743] | 2017-07-12 | Paper |
| Boolean functions and their applications in cryptography | 2016-12-02 | Paper |
| Higher order nonlinearity of Niho functions | 2016-05-11 | Paper |
| On \((k,n)\) visual cryptography scheme with\( t\) essential parties | 2015-09-30 | Paper |
| Threshold secret image sharing | 2014-09-29 | Paper |
| Flexible Visual Cryptography Scheme and Its Application | 2014-05-06 | Paper |
| ESSVCS: an enriched secret sharing visual cryptography | 2014-05-06 | Paper |
| Cube attack on grain | 2013-11-19 | Paper |
| Analysis of an authenticated identity-based multicast scheme | 2013-10-18 | Paper |
| An ID-based authenticated dynamic group key agreement with optimal round | 2013-08-20 | Paper |
| Visual cryptography for natural images and visual voting | 2013-05-28 | Paper |
| Multi-pixel encryption visual cryptography | 2013-01-07 | Paper |
| On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3 | 2013-01-07 | Paper |
| Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers | 2012-09-10 | Paper |
| CMQV+: an authenticated key exchange protocol from CMQV | 2012-08-17 | Paper |
| On the equivalence of two definitions of visual cryptography scheme | 2012-06-29 | Paper |
| The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity | 2012-06-20 | Paper |
| On guess and determine analysis of Rabbit | 2011-10-10 | Paper |
| An efficient dynamic authenticated key exchange protocol with selectable identities | 2011-09-18 | Paper |
| Some functions with low differential uniformity | 2011-07-19 | Paper |
| Linear Approximations of Addition Modulo 2n-1 | 2011-07-07 | Paper |
| Loiss: A Byte-Oriented Stream Cipher | 2011-06-08 | Paper |
| A byte-based guess and determine attack on SOSEMANUK | 2010-12-07 | Paper |
| A new definition of the contrast of visual cryptography scheme | 2010-09-07 | Paper |
| Set signatures and their applications | 2010-03-03 | Paper |
| Construction and enumeration of Boolean functions with maximum algebraic immunity | 2010-02-26 | Paper |
| Cryptanalysis of a new stream cipher structure | 2010-02-12 | Paper |
| The alignment problem of visual cryptography schemes | 2009-03-31 | Paper |
| The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity | 2009-03-24 | Paper |
| An Unconditionally Secure Protocol for Multi-Party Set Intersection | 2009-03-10 | Paper |
| Security of the redefined Liaw's broadcasting cryptosystem | 2009-01-26 | Paper |
| Authenticated Group Key Agreement for Multicast | 2009-01-09 | Paper |
| The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function | 2008-11-27 | Paper |
| Idetity based group key agreement from bilinear pairing | 2007-06-01 | Paper |
| Identity based group key agreement in multiple PKG environment | 2007-06-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5714535 | 2006-01-03 | Paper |
| Differential Factoring for Integers | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5699432 | 2005-10-26 | Paper |
| On the independence of Boolean functions | 2005-03-07 | Paper |
| Construction of cryptographically important Boolean permutations | 2005-02-09 | Paper |
| Correlation immunity and resiliency of symmetric Boolean functions | 2004-10-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4473636 | 2004-08-04 | Paper |
| Construction of 2-designs | 2002-06-25 | Paper |
| Public key cryptosystems based on boolean permutations and their applications | 2000-11-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4495079 | 2000-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4488566 | 2000-07-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3842516 | 1999-02-18 | Paper |
| Existence of generalized inverse of linear transformations over finite fields | 1998-12-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373628 | 1998-05-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4359590 | 1997-10-20 | Paper |
| Efficient construction of permutations of high nonlinearity | 1993-12-20 | Paper |
| Some spectral techniques in coding theory | 1991-01-01 | Paper |