| Publication | Date of Publication | Type |
|---|
A formal treatment of end-to-end encrypted cloud storage | 2024-12-04 | Paper |
\textit{Caveat implementor!} Key recovery attacks on MEGA Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Puncturable key wrapping and its applications Advances in Cryptology – ASIACRYPT 2022 | 2023-08-16 | Paper |
An efficient query recovery attack against a graph encryption scheme Computer Security – ESORICS 2022 | 2023-07-21 | Paper |
Average Case Error Estimates of the Strong Lucas Test | 2023-06-15 | Paper |
Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange Post-Quantum Cryptography | 2022-10-13 | Paper |
Anonymous, robust post-quantum public key encryption | 2022-08-30 | Paper |
Tightly secure ring-LWE based key encapsulation with short ciphertexts | 2022-08-25 | Paper |
Multilinear maps from obfuscation Journal of Cryptology | 2020-06-15 | Paper |
Safety in numbers: on the need for robust Diffie-Hellman parameter validation | 2020-01-28 | Paper |
Public-key cryptography on smart cards Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Related-key security for pseudorandom functions beyond the linear barrier Journal of Cryptology | 2018-11-01 | Paper |
A cryptographic analysis of the WireGuard protocol | 2018-08-10 | Paper |
Statistical attacks on cookie masking for RC4 Cryptography and Communications | 2018-05-28 | Paper |
Cold boot attacks on NTRU | 2018-04-26 | Paper |
Analysing and exploiting the Mantin biases in RC4 Designs, Codes and Cryptography | 2018-04-10 | Paper |
Analyzing multi-key security degradation | 2018-03-08 | Paper |
Key rotation for authenticated encryption | 2017-10-27 | Paper |
Properties of the Error Linear Complexity Spectrum IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Backdoors in pseudorandom number generators: possibility and impossibility results Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Lucky microseconds: a timing attack on Amazon's s2n implementation of TLS Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Multilinear maps from obfuscation Theory of Cryptography | 2016-03-23 | Paper |
Security Against Related Randomness Attacks via Reconstructive Extractors Cryptography and Coding | 2016-01-12 | Paper |
Data is a stream: security of stream-based channels Lecture Notes in Computer Science | 2015-12-10 | Paper |
Plaintext Recovery Attacks Against WPA/TKIP Fast Software Encryption | 2015-09-18 | Paper |
On symmetric encryption with distinguishable decryption failures Fast Software Encryption | 2015-09-18 | Paper |
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms Lecture Notes in Computer Science | 2015-08-27 | Paper |
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper) Lecture Notes in Computer Science | 2015-01-16 | Paper |
ASICS: Authenticated key exchange security incorporating certification systems Lecture Notes in Computer Science | 2014-10-16 | Paper |
Related-key security for pseudorandom functions beyond the linear barrier Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Security of symmetric encryption against mass surveillance Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Related randomness attacks for public key encryption Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Signal-flow-based analysis of wireless security protocols Information and Computation | 2013-12-03 | Paper |
On the security of the TLS protocol: a systematic analysis Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Programmable hash functions in the multilinear setting Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Robust encryption, revisited Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Non-interactive key exchange Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
RKA security beyond the linear barrier: IBE, encryption and signatures Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
A coding-theoretic approach to recovering noisy RSA keys Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Simple, efficient and strongly KI-secure hierarchical key assignment schemes Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Security of symmetric encryption in the presence of ciphertext fragmentation Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
On the joint security of encryption and signature in EMV Lecture Notes in Computer Science | 2012-06-08 | Paper |
Authenticated-encryption with padding: a formal security treatment Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Breaking an identity-based encryption scheme based on DHIES Cryptography and Coding | 2011-12-16 | Paper |
On the joint security of encryption and signature, revisited Lecture Notes in Computer Science | 2011-12-02 | Paper |
Tag size does matter: attacks and proofs for the TLS record protocol Lecture Notes in Computer Science | 2011-12-02 | Paper |
On cipher-dependent related-key attacks in the ideal-cipher model Fast Software Encryption | 2011-07-07 | Paper |
Provably Secure Key Assignment Schemes from Factoring Information Security and Privacy | 2011-07-07 | Paper |
Time-specific encryption Lecture Notes in Computer Science | 2010-09-10 | Paper |
Plaintext-dependent decryption: a formal security treatment of SSH-CTR Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Certificateless public key cryptography Lecture Notes in Computer Science | 2010-01-05 | Paper |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups Designs, Codes and Cryptography | 2009-10-14 | Paper |
Building Key-Private Public-Key Encryption Schemes Information Security and Privacy | 2009-06-25 | Paper |
One-round key exchange in the standard model International Journal of Applied Cryptography | 2009-05-12 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Pairings for cryptographers Discrete Applied Mathematics | 2009-03-04 | Paper |
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities Pairing-Based Cryptography – Pairing 2008 | 2009-02-10 | Paper |
On Codes With Low Peak-to-Average Power Ratio for Multicode CDMA IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment Lecture Notes in Computer Science | 2008-11-20 | Paper |
Efficient One-Round Key Exchange in the Standard Model Information Security and Privacy | 2008-07-08 | Paper |
Modular Security Proofs for Key Agreement Protocols Lecture Notes in Computer Science | 2008-03-18 | Paper |
Multi-key Hierarchical Identity-Based Signatures Cryptography and Coding | 2008-03-07 | Paper |
Certificateless Encryption Schemes Strongly Secure in the Standard Model Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Proxy Signatures Secure Against Proxy Key Exposure Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2007-11-28 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Cryptography in Theory and Practice: The Case of Encryption in IPsec Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Efficient Identity-Based Signatures Secure in the Standard Model Information Security and Privacy | 2007-09-07 | Paper |
A comment on "A new public-key cipher system based upon the Diophantine equations" IEEE Transactions on Computers | 2007-01-09 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/ IEEE Transactions on Information Theory | 2005-05-31 | Paper |
scientific article; zbMATH DE number 2079929 (Why is no real title available?) | 2004-08-03 | Paper |
scientific article; zbMATH DE number 2063201 (Why is no real title available?) | 2004-03-29 | Paper |
Single-track circuit codes IEEE Transactions on Information Theory | 2002-08-04 | Paper |
scientific article; zbMATH DE number 1972831 (Why is no real title available?) | 2002-01-01 | Paper |
scientific article; zbMATH DE number 1390142 (Why is no real title available?) | 2001-11-22 | Paper |
On the existence and construction of good codes with low peak-to-average power ratios IEEE Transactions on Information Theory | 2001-03-19 | Paper |
Generalized Reed-Muller codes and power control in OFDM modulation IEEE Transactions on Information Theory | 2000-09-07 | Paper |
scientific article; zbMATH DE number 1418254 (Why is no real title available?) | 2000-08-24 | Paper |
scientific article; zbMATH DE number 1424154 (Why is no real title available?) | 2000-05-15 | Paper |
Efficient decoding algorithms for generalized Reed-Muller codes. IEEE Transactions on Communications | 2000-01-01 | Paper |
Root counting, the DFT and the linear complexity of nonlinear filtering Designs, Codes and Cryptography | 1999-08-17 | Paper |
Bounds on partial correlations of sequences IEEE Transactions on Information Theory | 1999-05-31 | Paper |
Some new circuit codes IEEE Transactions on Information Theory | 1999-04-20 | Paper |
Perfect Factors from Cyclic Codes and Interleaving SIAM Journal on Discrete Mathematics | 1998-05-11 | Paper |
Binary sequence sets with favorable correlations from difference sets and MDS codes IEEE Transactions on Information Theory | 1998-01-01 | Paper |
Permutation polynomials, de Bruijn sequences, and linear complexity Journal of Combinatorial Theory. Series A | 1997-10-01 | Paper |
scientific article; zbMATH DE number 1008455 (Why is no real title available?) | 1997-05-12 | Paper |
Near optimal single-track Gray codes IEEE Transactions on Information Theory | 1997-03-16 | Paper |
On the existence of de Bruijn tori with two by two windows Journal of Combinatorial Theory. Series A | 1996-12-16 | Paper |
A method for constructing decodable de Bruijn sequences IEEE Transactions on Information Theory | 1996-10-22 | Paper |
Single-track Gray codes IEEE Transactions on Information Theory | 1996-10-22 | Paper |
New classes of perfect maps. II Journal of Combinatorial Theory. Series A | 1996-05-13 | Paper |
New classes of perfect maps. I Journal of Combinatorial Theory. Series A | 1996-02-26 | Paper |
Perfect maps IEEE Transactions on Information Theory | 1995-10-05 | Paper |
Storage efficient decoding for a class of binary de Bruijn sequences Discrete Mathematics | 1995-08-08 | Paper |
Perfect factors in the de Bruijn graph Designs, Codes and Cryptography | 1995-02-26 | Paper |
A weak cipher that generates the symmetric group Journal of Cryptology | 1994-09-11 | Paper |
Decoding perfect maps Designs, Codes and Cryptography | 1994-08-24 | Paper |