| Publication | Date of Publication | Type |
|---|
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG Advances in Mathematics of Communications | 2024-09-16 | Paper |
On cryptographic properties of cubic and splitting Boolean functions Applicable Algebra in Engineering, Communication and Computing | 2024-09-11 | Paper |
On second-order derivatives of Boolean functions and cubic APN permutations in even dimension Mediterranean Journal of Mathematics | 2024-06-08 | Paper |
Group structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\) Journal of Mathematical Cryptology | 2024-03-16 | Paper |
Searchable encryption with randomized ciphertext and randomized keyword search Journal of Mathematical Cryptology | 2024-03-16 | Paper |
Provably unforgeable threshold EdDSA with an offline participant and trustless setup Mediterranean Journal of Mathematics | 2023-09-08 | Paper |
A coercion-resistant blockchain-based E-voting protocol with receipts Advances in Mathematics of Communications | 2023-07-07 | Paper |
A survey on functional encryption Advances in Mathematics of Communications | 2023-06-30 | Paper |
Elliptic loops Journal of Pure and Applied Algebra | 2023-06-26 | Paper |
On the equivalence of two post-quantum cryptographic families Annali di Matematica Pura ed Applicata. Serie Quarta | 2023-03-07 | Paper |
| A survey on the group of points arising from elliptic curves with a Weierstrass model over a ring | 2023-02-01 | Paper |
Rational points on cubic surfaces and AG codes from the norm-trace curve Annali di Matematica Pura ed Applicata. Serie Quarta | 2023-01-25 | Paper |
| scientific article; zbMATH DE number 7542487 (Why is no real title available?) | 2022-06-15 | Paper |
A note on an infeasible linearization of some block ciphers Journal of Discrete Mathematical Sciences and Cryptography | 2022-02-16 | Paper |
Threshold ECDSA with an offline recovery party Mediterranean Journal of Mathematics | 2021-11-30 | Paper |
Threshold ECDSA with an offline recovery party Mediterranean Journal of Mathematics | 2021-11-30 | Paper |
A formula on the weight distribution of linear codes with applications to AMDS codes Finite Fields and their Applications | 2021-11-23 | Paper |
On the linear structures of balanced functions and quadratic APN functions Cryptography and Communications | 2021-07-13 | Paper |
Intersections between the norm-trace curve and some low degree curves Finite Fields and their Applications | 2021-02-18 | Paper |
Rational points on cubic surfaces and AG codes from the Norm-Trace curve (available as arXiv preprint) | 2021-02-10 | Paper |
| Zech tableaux as tools for sparse decoding | 2021-02-06 | Paper |
On properties of translation groups in the affine general linear group with applications to cryptography Journal of Algebra | 2020-12-16 | Paper |
HELP: a sparse error locator polynomial for BCH codes Applicable Algebra in Engineering, Communication and Computing | 2020-07-15 | Paper |
| A power APN function CCZ-equivalent to Kasami function in even dimension | 2020-04-13 | Paper |
Weight distribution of Hermitian codes and matrices rank Finite Fields and their Applications | 2019-11-22 | Paper |
A proof of security for a key-policy RS-ABE scheme JP Journal of Algebra, Number Theory and Applications | 2019-08-16 | Paper |
Differential attacks: using alternative operations Designs, Codes and Cryptography | 2019-02-20 | Paper |
Wave-shaped round functions and primitive groups Advances in Mathematics of Communications | 2019-02-15 | Paper |
On hidden sums compatible with a given block cipher diffusion layer Discrete Mathematics | 2018-11-29 | Paper |
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes International Journal of Information and Coding Theory | 2018-11-05 | Paper |
Hilbert quasi-polynomial for order domains and application to coding theory Advances in Mathematics of Communications | 2018-09-21 | Paper |
On the Shape of the General Error Locator Polynomial for Cyclic Codes IEEE Transactions on Information Theory | 2018-09-19 | Paper |
On the discrete logarithm problem for prime-field elliptic curves Finite Fields and their Applications | 2018-04-27 | Paper |
Several proofs of security for a tokenization algorithm Applicable Algebra in Engineering, Communication and Computing | 2017-12-04 | Paper |
A note on APN permutations in even dimension Finite Fields and their Applications | 2017-07-13 | Paper |
Some Bounds on the Size of Codes IEEE Transactions on Information Theory | 2017-05-16 | Paper |
On Optimal Nonlinear Systematic Codes IEEE Transactions on Information Theory | 2017-04-28 | Paper |
The group generated by the round functions of a GOST-like cipher Annali di Matematica Pura ed Applicata. Serie Quarta | 2017-02-17 | Paper |
On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion Applicable Algebra in Engineering, Communication and Computing | 2017-01-13 | Paper |
| An algorithmic approach using multivariate polynomials for the nonlinearity of Boolean functions | 2016-10-19 | Paper |
A discrete logarithm-based approach to compute low-weight multiples of binary polynomials Finite Fields and their Applications | 2016-02-09 | Paper |
On differential uniformity of maps that may hide an algebraic trapdoor Algebraic Informatics | 2015-09-22 | Paper |
Key-policy multi-authority attribute-based encryption Algebraic Informatics | 2015-09-22 | Paper |
Attacking BEAR and LION schemes in a realistic scenario Algebraic Informatics | 2015-09-22 | Paper |
On the small-weight codewords of some Hermitian codes Journal of Symbolic Computation | 2015-08-24 | Paper |
Some security bounds for the key sizes of DGHV scheme Applicable Algebra in Engineering, Communication and Computing | 2015-02-05 | Paper |
| On the Griesmer bound for nonlinear codes | 2015-01-18 | Paper |
| The role of Boolean functions in hiding sums as trapdoors for some block ciphers | 2014-11-27 | Paper |
On the Hermitian curve and its intersections with some conics Finite Fields and their Applications | 2014-08-28 | Paper |
On the Hermitian curve and its intersections with some conics Finite Fields and their Applications | 2014-08-28 | Paper |
| A weight-distribution bound for entropy extractors using linear binary codes | 2014-05-12 | Paper |
On the group generated by the round functions of translation based ciphers over arbitrary finite fields Finite Fields and their Applications | 2014-02-05 | Paper |
Generalized AG codes as evaluation codes Algebraic Informatics | 2013-09-20 | Paper |
A new bound for cyclic codes beating the Roos bound Algebraic Informatics | 2013-09-20 | Paper |
Postulation of general quintuple fat point schemes in \(\mathbb P^3\) Journal of Algebra | 2013-02-21 | Paper |
On the evaluation of multivariate polynomials over finite fields Journal of Symbolic Computation | 2013-01-10 | Paper |
Improved decoding of affine-variety codes Journal of Pure and Applied Algebra | 2012-10-19 | Paper |
On the provable security of BEAR and LION schemes Applicable Algebra in Engineering, Communication and Computing | 2012-06-20 | Paper |
On weakly APN functions and 4-bit S-boxes Finite Fields and their Applications | 2012-05-07 | Paper |
Computing the distance distribution of systematic nonlinear codes Journal of Algebra and its Applications | 2010-05-21 | Paper |
On some block ciphers and imprimitive groups Applicable Algebra in Engineering, Communication and Computing | 2010-01-18 | Paper |
Gröbner Bases, Coding, and Cryptography: a Guide to the State-of-Art Gröbner Bases, Coding, and Cryptography | 2009-12-16 | Paper |
An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher Designs, Codes and Cryptography | 2009-10-14 | Paper |
A commutative algebra approach to linear codes Journal of Algebra | 2009-06-17 | Paper |
Error resilient data transport in sensor network applications: A generic perspective International Journal of Circuit Theory and Applications | 2009-03-24 | Paper |
A New Bound for the Minimum Distance of a Cyclic Code From Its Defining Set IEEE Transactions on Information Theory | 2008-12-21 | Paper |
General Error Locator Polynomials for Binary Cyclic Codes With <formula formulatype="inline"><tex>$t \le 2$</tex></formula> and <formula formulatype="inline"> <tex>$n &lt; 63$</tex></formula> IEEE Transactions on Information Theory | 2008-12-21 | Paper |
| Permutation equivalent maximal irreducible Goppa codes | 2008-06-10 | Paper |
GRÖBNER BASIS TECHNIQUES TO COMPUTE WEIGHT DISTRIBUTIONS OF SHORTENED CYCLIC CODES Journal of Algebra and its Applications | 2007-08-10 | Paper |
scientific article; zbMATH DE number 5150119 (Why is no real title available?) (available as arXiv preprint) | 2007-05-08 | Paper |
On the Gröbner basis of a family of quasi-cyclic LDPC codes Bulletin of the Iranian Mathematical Society | 2007-04-10 | Paper |
Correcting errors and erasures via the syndrome variety Journal of Pure and Applied Algebra | 2005-06-23 | Paper |
On the Gröbner bases of some symmetric systems and their application to coding theory. Journal of Symbolic Computation | 2004-03-14 | Paper |
Upper bounds on the dual distance of BCH\((255, k)\) Designs, Codes and Cryptography | 2003-11-10 | Paper |
| scientific article; zbMATH DE number 1846863 (Why is no real title available?) | 2002-12-17 | Paper |
Gröbner bases and distance of cyclic codes Applicable Algebra in Engineering, Communication and Computing | 2002-07-29 | Paper |
A linear programming estimate of the weight distribution of BCH\((255,k)\) IEEE Transactions on Information Theory | 2001-03-19 | Paper |