Publication | Date of Publication | Type |
---|
A Symbolic Model for Systematically Analyzing TEE-Based Protocols | 2022-12-21 | Paper |
Quantum protocols for secure multi-party summation | 2022-11-25 | Paper |
A new perturbation algorithm and enhancing security of SFLASH signature scheme | 2022-10-28 | Paper |
Design theory and method of multivariate hash function | 2022-10-28 | Paper |
A public key cryptosystem based on data complexity under quantum environment | 2022-10-28 | Paper |
On the coefficients of the polynomial in the number field sieve | 2022-10-28 | Paper |
Entanglement swapping for Bell states and Greenberger-Horne-Zeilinger states in qubit systems | 2022-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q5035535 | 2022-02-22 | Paper |
Cryptanalysis and improvement of several quantum private comparison protocols | 2021-01-12 | Paper |
New quantum private comparison protocol without a third party | 2020-06-19 | Paper |
Cryptanalysis of He’s quantum private comparison protocol and a new protocol | 2019-11-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q5196099 | 2019-10-02 | Paper |
Two-party quantum private comparison protocol with maximally entangled seven-qubit state | 2019-09-23 | Paper |
Cryptanalysis and improvement of Ye et al's quantum private comparison protocol | 2019-09-03 | Paper |
Cryptanalysis of Zhang et al's quantum private comparison and the improvement | 2019-09-03 | Paper |
A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function | 2019-03-15 | Paper |
Bit-oriented quantum public-key cryptosystem based on Bell states | 2018-08-02 | Paper |
Quantum public key cryptosystem based on Bell states | 2018-02-05 | Paper |
Quantum algorithm to solve function inversion with time-space trade-off | 2017-10-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q5371487 | 2017-10-20 | Paper |
A new quantum algorithm for computing RSA ciphertext period | 2017-10-20 | Paper |
New public-key cryptosystem based on the morphism of polynomials problem | 2017-07-14 | Paper |
Cryptanalysis of public key cryptosystems based on non-Abelian factorization problems | 2017-07-14 | Paper |
A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function | 2017-05-05 | Paper |
Cryptanalysis of schemes based on pseudoinverse matrix | 2016-10-06 | Paper |
Toward reverse engineering on secret \(S\)-boxes in block ciphers | 2015-11-20 | Paper |
A class of the hamming weight hierarchy of linear codes with dimension 5 | 2015-10-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q5260607 | 2015-06-29 | Paper |
Polynomial-time quantum algorithms for finding the linear structures of Boolean function | 2015-06-05 | Paper |
Quantum algorithm to find invariant linear structure of \(MD\) hash functions | 2015-04-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q5400150 | 2014-02-28 | Paper |
Capability of evolutionary cryptosystems against differential cryptanalysis | 2013-07-03 | Paper |
Evolutionary cryptography against multidimensional linear cryptanalysis | 2013-07-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4926907 | 2013-06-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q2916723 | 2012-10-05 | Paper |
Polar differential power attacks and evaluation | 2012-08-17 | Paper |
Extended multivariate public key cryptosystems with secure encryption function | 2012-05-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q3110735 | 2012-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3110736 | 2012-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3110744 | 2012-01-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3016679 | 2011-07-19 | Paper |
Generation algorithm of a sort of P-permutations | 2011-07-19 | Paper |
A fast pseudorandom number generator with BLAKE hash function | 2011-07-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q3054736 | 2010-11-05 | Paper |
A new chaotic function and its cryptographic usage | 2010-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3403237 | 2010-02-12 | Paper |
Research on cryptology mechanism of trusted computing platform module | 2009-11-22 | Paper |
Cryptanalysis for stream cipher based on evolutionary computation | 2009-11-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3609521 | 2009-03-06 | Paper |
Self-dual permutation codes over finite chain rings | 2009-03-06 | Paper |
A novel algorithm enumerating bent functions | 2009-01-28 | Paper |
Complete Mapping Polynomials over Finite Field F 16 | 2007-11-15 | Paper |
Survey of information security | 2007-10-12 | Paper |
Analysis of affinely equivalent Boolean functions | 2007-10-12 | Paper |
An extended hierarchical trusted model for wireless sensor networks | 2007-06-01 | Paper |
Security analysis of broadcaster group key exchange protocols | 2007-06-01 | Paper |
The mechanism about key and credential on trusted computing platform and the application study | 2007-06-01 | Paper |
A new fast modular arithmetic method in public key cryptography | 2007-06-01 | Paper |
A forward integrity and itinerary secrecy protocol for mobile agents | 2007-06-01 | Paper |
An improved grid security infrastructure by trusted computing | 2007-06-01 | Paper |
A dynamic active multicast group access control framework based on trust management system | 2007-06-01 | Paper |
A behavior-based remote trust attestation model | 2007-06-01 | Paper |
Analysis and application of covert channels of internet control message protocol | 2007-06-01 | Paper |
A potential approach of internet worm propagation based on P2P | 2007-06-01 | Paper |
On the degree of homogeneous bent functions | 2007-04-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q3422568 | 2007-02-13 | Paper |
A fast attack algorithm on the MD5 hash function | 2006-11-15 | Paper |
Weighted proximal support vector machines: Robust classification | 2005-11-21 | Paper |
Trace representations of S-boxes and their application | 2005-10-27 | Paper |
An improved non-repudiation protocol and its security analysis | 2005-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2719666 | 2001-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4233178 | 1999-03-16 | Paper |
Cryptanalysis on a finite automaton public key cryptosystem | 1997-09-07 | Paper |