| Publication | Date of Publication | Type |
|---|
| A lower bound on the share size of leakage-resilient secret-sharing schemes | 2024-10-02 | Paper |
| Cryptography based on transcendental numbers | 2024-07-11 | Paper |
| Cryptosystems for hierarchical groups | 2024-07-11 | Paper |
| On selectable collisionful hash functions | 2024-07-11 | Paper |
| On password-based authenticated key exchange using collisionful hash functions | 2024-07-11 | Paper |
Group encryption: full dynamicity, message filtering and code-based instantiation Theoretical Computer Science | 2024-06-28 | Paper |
| Lower bounds on the share size of leakage resilient cheating detectable secret sharing | 2024-06-05 | Paper |
Traceable policy-based signatures and instantiation from lattices Information Sciences | 2024-03-13 | Paper |
| Leakage-Resilient Secret Sharing in Non-Compartmentalized Models. | 2023-11-02 | Paper |
Game-Theoretic Analysis of an Incentivized Verifiable Computation System Financial Cryptography and Data Security | 2023-08-03 | Paper |
| Leakage Resilient Cheating Detectable Secret Sharing Schemes | 2023-04-13 | Paper |
Batch verifiable computation of polynomials on outsourced data Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
scientific article; zbMATH DE number 7559096 (Why is no real title available?) (available as arXiv preprint) | 2022-07-18 | Paper |
| Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood) | 2022-06-01 | Paper |
| An intermediate secret-guessing attack on hash-based signatures | 2022-04-22 | Paper |
| Password protected secret sharing from lattices | 2022-03-21 | Paper |
| Group encryption: full dynamicity, message filtering and code-based instantiation | 2021-12-21 | Paper |
Privacy-preserving verifiable delegation of polynomial and matrix functions Journal of Mathematical Cryptology | 2021-05-03 | Paper |
Economically optimal variable tag length message authentication Financial Cryptography and Data Security | 2021-03-17 | Paper |
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions Designs, Codes and Cryptography | 2020-03-27 | Paper |
Keyed hash functions Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
| New attacks and secure design for anonymous distance-bounding | 2018-09-26 | Paper |
| In-region authentication | 2018-08-10 | Paper |
Secret Sharing with Binary Shares (available as arXiv preprint) | 2018-08-08 | Paper |
MRD hashing Fast Software Encryption | 2018-05-09 | Paper |
| A virtual wiretap channel for secure message transmission | 2017-10-23 | Paper |
On Optimal Secure Message Transmission by Public Discussion IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Codes for detection of limited view algebraic tampering Information Security and Cryptology | 2017-05-05 | Paper |
A Model for Adversarial Wiretap Channels IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Detecting algebraic manipulation in leaky storage systems Lecture Notes in Computer Science | 2017-01-06 | Paper |
Automated proofs of block cipher modes of operation Journal of Automated Reasoning | 2016-05-26 | Paper |
An efficient post-quantum one-time signature scheme Lecture Notes in Computer Science | 2016-05-19 | Paper |
Almost optimum secret sharing with cheating detection Security, Privacy, and Applied Cryptography Engineering | 2015-11-25 | Paper |
Batch verifiable computation of outsourced functions Designs, Codes and Cryptography | 2015-10-26 | Paper |
Detection of algebraic manipulation in the presence of leakage Lecture Notes in Computer Science | 2015-09-30 | Paper |
Limited view adversary codes: bounds, constructions and applications Lecture Notes in Computer Science | 2015-09-24 | Paper |
A True Random Generator Using Human Gameplay Lecture Notes in Computer Science | 2014-09-15 | Paper |
Paillier-based publicly verifiable (non-interactive) secret sharing Designs, Codes and Cryptography | 2014-08-18 | Paper |
Private message transmission using disjoint paths Applied Cryptography and Network Security | 2014-07-07 | Paper |
Verifiable multi-server private information retrieval Applied Cryptography and Network Security | 2014-07-07 | Paper |
Unconditionally-secure ideal robust secret sharing schemes for threshold and multilevel access structure Journal of Mathematical Cryptology | 2014-01-23 | Paper |
On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection Lecture Notes in Computer Science | 2014-01-14 | Paper |
Proofs of retrievability via fountain code Foundations and Practice of Security | 2013-08-07 | Paper |
Message transmission and key establishment: conditions for equality of weak and strong capacities Foundations and Practice of Security | 2013-08-07 | Paper |
Short pairing-efficient threshold-attribute-based signature Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Attribute-based encryption without key cloning International Journal of Applied Cryptography | 2012-11-16 | Paper |
Guessing Secrecy Lecture Notes in Computer Science | 2012-11-06 | Paper |
Private fingerprint matching Information Security and Privacy | 2012-09-07 | Paper |
Fuzzy universal hashing and approximate authentication Discrete Mathematics, Algorithms and Applications | 2012-08-27 | Paper |
Bounds and constructions for \(1\)-round \((0,\delta )\)-secure message transmission against generalized adversary Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
On ``the power of verification queries in unconditionally secure message authentication Discrete Mathematics, Algorithms and Applications | 2012-06-12 | Paper |
Breaking and repairing an approximate message authentication scheme Discrete Mathematics, Algorithms and Applications | 2012-06-12 | Paper |
Secret key establishment over noisy channels Foundations and Practice of Security | 2012-06-08 | Paper |
Automated verification of block cipher modes of operation, an improved method Foundations and Practice of Security | 2012-06-08 | Paper |
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
Secret keys from channel noise Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Common Randomness and Secret Key Capacities of Two-Way Channels Lecture Notes in Computer Science | 2011-05-19 | Paper |
Redistribution of mechanical secret shares Financial Cryptography | 2011-04-20 | Paper |
Traitor tracing for shortened and corrupted fingerprints Lecture Notes in Computer Science | 2011-03-18 | Paper |
Threshold Attribute-Based Signcryption Lecture Notes in Computer Science | 2010-09-10 | Paper |
Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Automated security proof for symmetric encryption modes Advances in Computer Science - ASIAN 2009. Information Security and Privacy | 2010-01-14 | Paper |
New results on unconditionally secure multi-receiver manual authentication Lecture Notes in Computer Science | 2009-12-03 | Paper |
How to Compare Image Watermarking Algorithms Transactions on Data Hiding and Multimedia Security IV | 2009-07-24 | Paper |
Unconditionally Secure Approximate Message Authentication Lecture Notes in Computer Science | 2009-07-23 | Paper |
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme Applied Cryptography and Network Security | 2009-03-10 | Paper |
Authentication Codes in the Query Model Coding and Cryptology | 2009-03-09 | Paper |
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions Information Security and Privacy | 2009-03-06 | Paper |
Information Theoretic Bounds on Authentication Systems in Query Model IEEE Transactions on Information Theory | 2009-02-24 | Paper |
An Efficient Deniable Key Exchange Protocol (Extended Abstract) Financial Cryptography and Data Security | 2009-02-12 | Paper |
Classification of the Deletion Correcting Capabilities of Reed–Solomon Codes of Dimension $2$ Over Prime Fields IEEE Transactions on Information Theory | 2008-12-21 | Paper |
RFID Privacy Models Revisited Computer Security - ESORICS 2008 | 2008-10-27 | Paper |
Multi-party Concurrent Signatures Lecture Notes in Computer Science | 2008-06-17 | Paper |
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search Lecture Notes in Computer Science | 2008-06-17 | Paper |
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature) Lecture Notes in Computer Science | 2008-03-18 | Paper |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Construction of deletion correcting codes using generalized Reed-Solomon codes and their subcodes Designs, Codes and Cryptography | 2007-09-20 | Paper |
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability Automata, Languages and Programming | 2007-09-11 | Paper |
A Note on the Exposure Property of SBIBD Electronic Notes in Discrete Mathematics | 2007-05-29 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Secret sharing schemes with partial broadcast channels Designs, Codes and Cryptography | 2006-11-22 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
RESILIENT LKH: SECURE MULTICAST KEY DISTRIBUTION SCHEMES International Journal of Foundations of Computer Science | 2006-10-16 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Recursive constructions of secure codes and hash families using difference function families. Journal of Combinatorial Theory. Series A | 2006-05-18 | Paper |
2-secure codes from 2-SFP codes Journal of Discrete Mathematical Sciences and Cryptography | 2006-01-13 | Paper |
Computing and Combinatorics Lecture Notes in Computer Science | 2006-01-11 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03 Applied Mathematics and Computation | 2005-11-22 | Paper |
Distributing the encryption and decryption of a block cipher Designs, Codes and Cryptography | 2005-11-07 | Paper |
| scientific article; zbMATH DE number 2222187 (Why is no real title available?) | 2005-11-02 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 2174614 (Why is no real title available?) | 2005-06-09 | Paper |
Linear authentication codes: bounds and constructions IEEE Transactions on Information Theory | 2005-06-01 | Paper |
Sequential traitor tracing IEEE Transactions on Information Theory | 2005-06-01 | Paper |
On the Maximal Codes of Length 3 with the 2-Identifiable Parent Property SIAM Journal on Discrete Mathematics | 2005-02-28 | Paper |
| scientific article; zbMATH DE number 2127884 (Why is no real title available?) | 2005-01-14 | Paper |
| scientific article; zbMATH DE number 2087911 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2080186 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2080169 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2069521 (Why is no real title available?) | 2004-05-27 | Paper |
| scientific article; zbMATH DE number 2065946 (Why is no real title available?) | 2004-05-18 | Paper |
| scientific article; zbMATH DE number 1303980 (Why is no real title available?) | 2004-03-09 | Paper |
| scientific article; zbMATH DE number 2048539 (Why is no real title available?) | 2004-03-01 | Paper |
Bounds And Constructions For Threshold Shared Generation Of Authenticators International Journal of Computer Mathematics | 2003-10-21 | Paper |
| scientific article; zbMATH DE number 1955789 (Why is no real title available?) | 2003-07-29 | Paper |
| scientific article; zbMATH DE number 1952895 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1950616 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950604 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950632 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950331 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1945880 (Why is no real title available?) | 2003-07-03 | Paper |
| scientific article; zbMATH DE number 1857521 (Why is no real title available?) | 2003-05-19 | Paper |
Multireceiver authentication codes: Models, bounds, constructions, and extensions Information and Computation | 2003-01-14 | Paper |
| scientific article; zbMATH DE number 1759651 (Why is no real title available?) | 2002-11-23 | Paper |
| scientific article; zbMATH DE number 1696657 (Why is no real title available?) | 2002-10-07 | Paper |
| scientific article; zbMATH DE number 1759787 (Why is no real title available?) | 2002-10-07 | Paper |
| scientific article; zbMATH DE number 1808278 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1808250 (Why is no real title available?) | 2002-09-26 | Paper |
New results on frame-proof codes and traceability schemes IEEE Transactions on Information Theory | 2002-08-04 | Paper |
| scientific article; zbMATH DE number 1500490 (Why is no real title available?) | 2002-07-28 | Paper |
Broadcast authentication for group communication Theoretical Computer Science | 2002-03-03 | Paper |
| scientific article; zbMATH DE number 1504565 (Why is no real title available?) | 2002-01-27 | Paper |
| scientific article; zbMATH DE number 1504564 (Why is no real title available?) | 2002-01-27 | Paper |
Combinatorial characterisation of \(\ell\)-optimal authentication codes with arbitration JCMCC. The Journal of Combinatorial Mathematics and Combinatorial Computing | 2001-09-19 | Paper |
| scientific article; zbMATH DE number 1588486 (Why is no real title available?) | 2001-07-17 | Paper |
| scientific article; zbMATH DE number 1588485 (Why is no real title available?) | 2001-07-17 | Paper |
| scientific article; zbMATH DE number 1583943 (Why is no real title available?) | 2001-07-08 | Paper |
| scientific article; zbMATH DE number 1612510 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1487949 (Why is no real title available?) | 2001-04-26 | Paper |
| scientific article; zbMATH DE number 1583950 (Why is no real title available?) | 2001-04-03 | Paper |
Remarks on the multiple assignment secret sharing scheme Information and Communications Security | 2001-04-01 | Paper |
| scientific article; zbMATH DE number 1543053 (Why is no real title available?) | 2001-02-26 | Paper |
| scientific article; zbMATH DE number 1543036 (Why is no real title available?) | 2001-02-26 | Paper |
| scientific article; zbMATH DE number 1500495 (Why is no real title available?) | 2000-09-04 | Paper |
| scientific article; zbMATH DE number 1487952 (Why is no real title available?) | 2000-08-10 | Paper |
Bounds and Techniques for Efficient Redistribution of Secret Shares to New Access Structures The Computer Journal | 2000-07-27 | Paper |
| scientific article; zbMATH DE number 1303147 (Why is no real title available?) | 2000-02-04 | Paper |
| scientific article; zbMATH DE number 1394303 (Why is no real title available?) | 2000-01-31 | Paper |
| scientific article; zbMATH DE number 1360745 (Why is no real title available?) | 1999-11-10 | Paper |
| scientific article; zbMATH DE number 1304306 (Why is no real title available?) | 1999-09-26 | Paper |
| scientific article; zbMATH DE number 1303964 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1303970 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1302798 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1189397 (Why is no real title available?) | 1998-10-08 | Paper |
| scientific article; zbMATH DE number 1189396 (Why is no real title available?) | 1998-08-13 | Paper |
A multi-level view model for secure object-oriented databases Data & Knowledge Engineering | 1998-07-22 | Paper |
| scientific article; zbMATH DE number 1107681 (Why is no real title available?) | 1998-06-07 | Paper |
| scientific article; zbMATH DE number 1153455 (Why is no real title available?) | 1998-05-17 | Paper |
| scientific article; zbMATH DE number 1088920 (Why is no real title available?) | 1998-04-22 | Paper |
Secret sharing in hierarchical groups Information and Communications Security | 1998-02-16 | Paper |
| scientific article; zbMATH DE number 1189392 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1189378 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1186875 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1023997 (Why is no real title available?) | 1997-08-26 | Paper |
| scientific article; zbMATH DE number 1023995 (Why is no real title available?) | 1997-08-10 | Paper |
| scientific article; zbMATH DE number 1024097 (Why is no real title available?) | 1997-06-18 | Paper |
Authentication codes in plaintext and chosen-content attacks Designs, Codes and Cryptography | 1997-01-14 | Paper |
| scientific article; zbMATH DE number 842002 (Why is no real title available?) | 1996-08-05 | Paper |
| scientific article; zbMATH DE number 697810 (Why is no real title available?) | 1995-02-19 | Paper |
| scientific article; zbMATH DE number 177611 (Why is no real title available?) | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 4199439 (Why is no real title available?) | 1990-01-01 | Paper |