| Publication | Date of Publication | Type |
|---|
| Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit | 2023-11-10 | Paper |
| Measurement device-independent quantum secure direct communication with user authentication | 2022-12-06 | Paper |
| Dimensionality distinguishers | 2022-11-25 | Paper |
| Cryptanalysis of \textsc{FlexAEAD} | 2022-11-09 | Paper |
| Two-point FFT-based high capacity image steganography using calendar based message encoding | 2022-04-14 | Paper |
| Non-commutative space engine: a boost to thermodynamic processes | 2022-04-01 | Paper |
| Quantum cycle in relativistic non-commutative space with generalized uncertainty principle correction | 2022-03-01 | Paper |
| Quantum secure direct communication with mutual authentication using a single basis | 2022-01-03 | Paper |
| Two efficient measurement device independent quantum dialogue protocols | 2021-04-22 | Paper |
| Probing uncertainty relations in non-commutative space | 2019-09-03 | Paper |
| Revisiting integer factorization using closed timelike curves | 2019-03-15 | Paper |
| Quantum to classical one-way function and its applications in quantum money authentication | 2018-11-05 | Paper |
| Generalized nonlinearity of \(S\)-boxes | 2018-09-21 | Paper |
| Analysis of burn-in period for RC4 state transition | 2018-05-28 | Paper |
| On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers | 2018-05-24 | Paper |
| Key recovery attack against 2.5-round \(\pi\)-Cipher | 2018-05-09 | Paper |
| Designing parity preserving reversible circuits | 2018-03-16 | Paper |
| Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs | 2018-02-19 | Paper |
| Revisiting Generalized Bertand's Postulate and Prime Gaps | 2017-10-26 | Paper |
| Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE | 2017-08-25 | Paper |
| Three Snakes in One Hole: The First Systematic Hardware Accelerator Design for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes | 2017-05-16 | Paper |
| Revisiting the security proof of QUAD stream cipher: some corrections and tighter bounds | 2017-05-05 | Paper |
| One-key compression function based MAC with security beyond birthday bound | 2016-08-31 | Paper |
| Forward-secure authenticated symmetric key exchange protocol: new security model and secure construction | 2016-01-27 | Paper |
| Three-particle hyper-entanglement: teleportation and quantum key distribution | 2015-11-11 | Paper |
| Proving TLS-attack related open biases of RC4 | 2015-09-30 | Paper |
| Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA | 2015-09-18 | Paper |
| One word/cycle HC-128 accelerator via state-splitting optimization | 2015-09-10 | Paper |
| Deterministic hard fault attack on Trivium | 2015-05-27 | Paper |
| A resilient quantum secret sharing scheme | 2015-04-29 | Paper |
| Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 | 2014-08-20 | Paper |
| Eavesdropping in semiquantum key distribution protocol | 2014-08-13 | Paper |
| (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher | 2014-04-01 | Paper |
| Generic cryptographic weakness of \(k\)-normal Boolean functions in certain stream ciphers and cryptanalysis of Grain-128 | 2014-02-17 | Paper |
| New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 | 2013-06-07 | Paper |
| New speed records for Salsa20 stream cipher using an autotuning framework on GPUs | 2013-06-07 | Paper |
| Optimized GPU implementation and performance analysis of HC series of stream ciphers | 2013-06-04 | Paper |
| Impact of extending side channel attack on cipher variants: a case study with the HC series of stream ciphers | 2013-03-13 | Paper |
| Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function | 2012-10-23 | Paper |
| Proof of empirical RC4 biases and new key correlations | 2012-06-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3116974 | 2012-02-15 | Paper |
| A theoretical analysis of the structure of HC-128 | 2011-11-10 | Paper |
| Attack on broadcast RC4 revisited | 2011-07-07 | Paper |
| Some observations on HC-128 | 2011-04-08 | Paper |
| A cops and robber game in multidimensional grids | 2010-11-05 | Paper |
| On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling | 2010-01-14 | Paper |
| On biases of permutation and keystream bytes of RC4 towards the secret key | 2009-10-26 | Paper |
| Some Conjectures on the Number of Primes in Certain Intervals | 2009-05-30 | Paper |
| On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key | 2009-03-31 | Paper |
| Analysis of RC4 and Proposal of Additional Layers for Better Security Margin | 2009-01-22 | Paper |
| A complete characterization of the evolution of RC4 pseudo random generation algorithm | 2008-11-06 | Paper |
| New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 | 2008-09-18 | Paper |
| Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck | 2008-07-08 | Paper |
| On Non-randomness of the Permutation After RC4 Key Scheduling | 2008-04-17 | Paper |
| Permutation After RC4 Key Scheduling Reveals the Secret Key | 2008-03-25 | Paper |