| Publication | Date of Publication | Type |
|---|
Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit Quantum Information Processing | 2023-11-10 | Paper |
Measurement device-independent quantum secure direct communication with user authentication Quantum Information Processing | 2022-12-06 | Paper |
Dimensionality distinguishers Quantum Information Processing | 2022-11-25 | Paper |
Cryptanalysis of \textsc{FlexAEAD} Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
Two-point FFT-based high capacity image steganography using calendar based message encoding Information Sciences | 2022-04-14 | Paper |
Non-commutative space engine: a boost to thermodynamic processes Modern Physics Letters A | 2022-04-01 | Paper |
Quantum cycle in relativistic non-commutative space with generalized uncertainty principle correction Physica A | 2022-03-01 | Paper |
Quantum secure direct communication with mutual authentication using a single basis International Journal of Theoretical Physics | 2022-01-03 | Paper |
Two efficient measurement device independent quantum dialogue protocols International Journal of Quantum Information | 2021-04-22 | Paper |
Probing uncertainty relations in non-commutative space International Journal of Theoretical Physics | 2019-09-03 | Paper |
Revisiting integer factorization using closed timelike curves Quantum Information Processing | 2019-03-15 | Paper |
Quantum to classical one-way function and its applications in quantum money authentication Quantum Information Processing | 2018-11-05 | Paper |
Generalized nonlinearity of \(S\)-boxes Advances in Mathematics of Communications | 2018-09-21 | Paper |
Analysis of burn-in period for RC4 state transition Cryptography and Communications | 2018-05-28 | Paper |
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers Designs, Codes and Cryptography | 2018-05-24 | Paper |
Key recovery attack against 2.5-round \(\pi\)-Cipher Fast Software Encryption | 2018-05-09 | Paper |
Designing parity preserving reversible circuits | 2018-03-16 | Paper |
Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs Cryptography and Communications | 2018-02-19 | Paper |
Revisiting Generalized Bertand's Postulate and Prime Gaps | 2017-10-26 | Paper |
Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE | 2017-08-25 | Paper |
Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes IEEE Transactions on Computers | 2017-05-16 | Paper |
Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds Information Security and Cryptology | 2017-05-05 | Paper |
One-key compression function based MAC with security beyond birthday bound Information Security and Privacy | 2016-08-31 | Paper |
Forward-secure authenticated symmetric key exchange protocol: new security model and secure construction Provable Security | 2016-01-27 | Paper |
Three-particle hyper-entanglement: teleportation and quantum key distribution Quantum Information Processing | 2015-11-11 | Paper |
Proving TLS-attack related open biases of RC4 Designs, Codes and Cryptography | 2015-09-30 | Paper |
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Fast Software Encryption | 2015-09-18 | Paper |
One word/cycle HC-128 accelerator via state-splitting optimization Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Deterministic hard fault attack on Trivium Advances in Information and Computer Security | 2015-05-27 | Paper |
A resilient quantum secret sharing scheme International Journal of Theoretical Physics | 2015-04-29 | Paper |
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 Lecture Notes in Computer Science | 2014-08-20 | Paper |
Eavesdropping in semiquantum key distribution protocol Information Processing Letters | 2014-08-13 | Paper |
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher Journal of Cryptology | 2014-04-01 | Paper |
Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 Periodica Mathematica Hungarica | 2014-02-17 | Paper |
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
New speed records for Salsa20 stream cipher using an autotuning framework on GPUs Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Optimized GPU implementation and performance analysis of HC series of stream ciphers Lecture Notes in Computer Science | 2013-06-04 | Paper |
Impact of extending side channel attack on cipher variants: a case study with the HC series of stream ciphers Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function Information Processing Letters | 2012-10-23 | Paper |
Proof of empirical RC4 biases and new key correlations Selected Areas in Cryptography | 2012-06-08 | Paper |
scientific article; zbMATH DE number 6006600 (Why is no real title available?) | 2012-02-15 | Paper |
A theoretical analysis of the structure of HC-128 Advances in Information and Computer Security | 2011-11-10 | Paper |
Attack on broadcast RC4 revisited Fast Software Encryption | 2011-07-07 | Paper |
Some observations on HC-128 Designs, Codes and Cryptography | 2011-04-08 | Paper |
A cops and robber game in multidimensional grids Discrete Applied Mathematics | 2010-11-05 | Paper |
On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
On biases of permutation and keystream bytes of RC4 towards the secret key Cryptography and Communications | 2009-10-26 | Paper |
Some Conjectures on the Number of Primes in Certain Intervals | 2009-05-30 | Paper |
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key Designs, Codes and Cryptography | 2009-03-31 | Paper |
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
A complete characterization of the evolution of RC4 pseudo random generation algorithm Journal of Mathematical Cryptology | 2008-11-06 | Paper |
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 Fast Software Encryption | 2008-09-18 | Paper |
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck Information Security and Privacy | 2008-07-08 | Paper |
On Non-randomness of the Permutation After RC4 Key Scheduling Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
Permutation After RC4 Key Scheduling Reveals the Secret Key Selected Areas in Cryptography | 2008-03-25 | Paper |