| Publication | Date of Publication | Type |
|---|
| Permutations that separate close elements, and rectangle packings in the torus | 2024-11-09 | Paper |
| Constructions and bounds for codes with restricted overlaps | 2024-07-22 | Paper |
| Block‐avoiding point sequencings | 2024-02-02 | Paper |
| Subsets of free groups with distinct differences | 2023-07-07 | Paper |
| Permutations that separate close elements, and rectangle packings in the torus | 2023-06-06 | Paper |
| Permutations that separate close elements | 2023-03-06 | Paper |
| Constructions and bounds for codes with restricted overlaps | 2022-11-18 | Paper |
| The capacity of a finite field matrix channel | 2022-10-25 | Paper |
| Permutations that separate close elements | 2022-07-20 | Paper |
| The enumeration of finite rings | 2021-07-28 | Paper |
| PIR Array Codes With Optimal Virtual Server Rate | 2020-01-28 | Paper |
| PIR Schemes With Small Download Complexity and Low Storage Requirements | 2020-01-28 | Paper |
| Inglenook shunting puzzles | 2019-04-30 | Paper |
| Finite-Field Matrix Channels for Network Coding | 2019-03-28 | Paper |
| Practical attacks against the walnut digital signature scheme | 2018-12-20 | Paper |
| The minimum Manhattan distance and minimum jump of permutations | 2018-11-08 | Paper |
| Counting additive decompositions of quadratic residues in finite fields | 2018-04-20 | Paper |
| Two-Dimensional Patterns With Distinct Differences—Constructions, Bounds, and Maximal Anticodes | 2017-07-27 | Paper |
| Distinct Difference Configurations: Multihop Paths and Key Predistribution in Sensor Networks | 2017-07-27 | Paper |
| The Asymptotic Behavior of Grassmannian Codes | 2017-06-08 | Paper |
| Probabilistic Existence Results for Separable Codes | 2017-04-28 | Paper |
| Non-Overlapping Codes | 2017-04-28 | Paper |
| Maximum Likelihood Decoding for Multilevel Channels With Gain and Offset Mismatch | 2017-04-28 | Paper |
| Pearson Codes | 2017-04-28 | Paper |
| A Practical Cryptanalysis of the Algebraic Eraser | 2016-11-30 | Paper |
| Triangulations of the sphere, bitrades and abelian groups | 2015-01-07 | Paper |
| The discrete logarithm problem for exponents of bounded height | 2014-09-05 | Paper |
| Efficient Multiplicative Sharing Schemes | 2014-08-20 | Paper |
| Enumerating finite racks, quandles and kei | 2014-08-14 | Paper |
| Constructing \(k\)-radius sequences | 2013-07-17 | Paper |
| The probability that a pair of elements of a finite group are conjugate | 2012-12-06 | Paper |
| On the distribution of the subset sum pseudorandom number generator on elliptic curves | 2012-06-20 | Paper |
| On the complexity of the herding attack and some related attacks on hash functions | 2012-05-22 | Paper |
| Group theory in cryptography | 2011-11-22 | Paper |
| Cryptanalysis of three matrix-based key establishment protocols | 2011-11-15 | Paper |
| The existence of \(k\)-radius sequences | 2011-11-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3089173 | 2011-08-24 | Paper |
| Honeycomb arrays | 2010-12-16 | Paper |
| The discrete logarithm problem modulo one: cryptanalysing the Ariffin–Abu cryptosystem | 2010-11-12 | Paper |
| Traceability codes | 2010-09-27 | Paper |
| Cryptanalysis of the MST 3 public key cryptosystem | 2010-05-06 | Paper |
| Cryptanalysing the critical group: efficiently solving Biggs's discrete logarithm problem | 2010-02-05 | Paper |
| Connectivity of the uniform random intersection graph | 2009-12-15 | Paper |
| Prolific Codes with the Identifiable Parent Property | 2009-11-27 | Paper |
| A mathematical walk in Surrey | 2009-03-10 | Paper |
| Efficient Key Predistribution for Grid-Based Wireless Sensor Networks | 2009-01-09 | Paper |
| Key Refreshing in Wireless Sensor Networks | 2009-01-09 | Paper |
| Two-dimensional runlength constrained arrays with equal horizontal and vertical constraints | 2008-12-21 | Paper |
| A bound on the size of separating hash families | 2008-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5385841 | 2008-05-07 | Paper |
| On the average energy of circulant graphs | 2008-03-26 | Paper |
| Cryptanalysis of a homomorphic public-key cryptosystem over a finite group | 2008-02-21 | Paper |
| Cryptography and Coding | 2007-11-28 | Paper |
| Reconstructing noisy polynomial evaluation in residue rings | 2007-01-09 | Paper |
| A comment on "A new public-key cipher system based upon the Diophantine equations" | 2007-01-09 | Paper |
| Sets of permutations that generate the symmetric group pairwise. | 2006-12-07 | Paper |
| Character sums and nonlinear recurrence sequences | 2006-08-04 | Paper |
| Fast Software Encryption | 2005-12-27 | Paper |
| Predicting nonlinear pseudorandom number generators | 2005-04-27 | Paper |
| Frameproof Codes | 2004-01-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4432207 | 2003-10-22 | Paper |
| Products of subsets in an Abelian group | 2003-07-30 | Paper |
| An upper bound on the size of a code with the \(k\)-identifiable parent property | 2003-05-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2739441 | 2002-12-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945378 | 2002-03-18 | Paper |
| Perfect hash families: Probabilistic methods and explicit constructions | 2000-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502485 | 2000-09-12 | Paper |
| The linear complexity of the self-shrinking generator | 2000-09-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4484877 | 2000-06-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4934728 | 2000-02-01 | Paper |
| Groups of prime power order with derived subgroup of prime order | 1999-11-14 | Paper |
| Orthogonal sequences of polynomials over arbitrary fields | 1999-07-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4240560 | 1999-06-13 | Paper |
| Optimal linear perfect hash families | 1998-10-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4336199 | 1998-06-07 | Paper |
| A generalized rational interpolation problem and the solution of the Welch-Berlekamp key equation | 1998-05-18 | Paper |
| Fast rational interpolation, Reed-Solomon decoding, and the linear complexity profiles of sequences | 1998-02-23 | Paper |
| Permutation polynomials, de Bruijn sequences, and linear complexity | 1997-10-01 | Paper |
| A note on sequences with the shift and add property | 1997-08-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4349318 | 1997-08-17 | Paper |
| Node bisectors of Cayley graphs | 1996-12-01 | Paper |
| Some remarks on an algorithm of Fitzpatrick | 1996-07-28 | Paper |
| The cryptanalysis of a public-key implementation of finite group mappings | 1995-09-26 | Paper |
| A generalisation of the discrete Fourier transform: determining the minimal polynomial of a periodic sequence | 1995-03-01 | Paper |
| Enumeration within Isoclinism Classes of Groups of Prime Power Order | 1994-12-18 | Paper |
| Increasing the rate of output of \(m\)-sequences | 1994-10-19 | Paper |
| Exponent-Critical Groups | N/A | Paper |