| Publication | Date of Publication | Type |
|---|
| Two classes of 1-resilient semi-bent functions based on disjoint linear codes | 2024-09-26 | Paper |
| Further construction of even-variable balanced rotation symmetric Boolean functions with optimal algebraic immunity | 2024-08-27 | Paper |
| DP-Loc: a differential privacy-based indoor localization scheme with bilateral privacy protection | 2024-07-19 | Paper |
| Server-aided revocable attribute-based encryption resilient to decryption key exposure | 2023-08-02 | Paper |
| Improved security model for public-key authenticated encryption with keyword search | 2023-04-13 | Paper |
| Forward-secure revocable identity-based encryption | 2022-06-08 | Paper |
| Public-key authenticated encryption with keyword search revisited: security model and constructions | 2021-03-31 | Paper |
| (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance | 2020-12-10 | Paper |
| Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity | 2019-12-10 | Paper |
| Efficient and secure big data storage system with leakage resilience in cloud computing | 2018-11-27 | Paper |
| On the polynomial basis of \(\mathrm{GF}(2^n)\) having a small number of trace-one elements | 2018-10-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4566362 | 2018-06-14 | Paper |
| Arbitrated quantum signature of quantum messages with a semi-honest arbitrator | 2018-06-13 | Paper |
| RST Invariant Image Watermarking Algorithm With Mathematical Modeling and Analysis of the Watermarking Processes | 2017-10-09 | Paper |
| Distributed Opportunistic Scheduling for Ad Hoc Networks With Random Access: An Optimal Stopping Approach | 2017-08-08 | Paper |
| Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures | 2016-08-31 | Paper |
| Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage | 2016-08-10 | Paper |
| Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts | 2015-09-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5498094 | 2015-02-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5499443 | 2015-02-11 | Paper |
| Efficient democratic group signatures with threshold traceability | 2014-09-02 | Paper |
| On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs | 2011-05-19 | Paper |
| Some remarks on the TKIP key mixing function of IEEE 802.11i | 2011-01-05 | Paper |
| Human visual system based adaptive digital image watermarking | 2010-05-19 | Paper |
| Democratic group signatures with collective traceability | 2009-10-15 | Paper |
| Filling the gap between voters and cryptography in e-voting | 2009-06-30 | Paper |
| RST invariant digital image watermarking based on a new phase-only filtering method | 2009-05-18 | Paper |
| The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization | 2009-02-24 | Paper |
| A Tamper-Evident Voting Machine Resistant to Covert Channels | 2009-01-27 | Paper |
| Identity-Based Threshold Key-Insulated Encryption without Random Oracles | 2008-04-24 | Paper |
| Analysis of information leakage in quantum key agreement | 2006-11-15 | Paper |
| Ising spin-based error correcting private-key cryptosystems | 2006-11-15 | Paper |
| How to play E-lottery games via voting | 2006-11-15 | Paper |
| Information Security | 2006-10-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700999 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700998 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5700989 | 2005-11-02 | Paper |
| Multiparty authentication services and key agreement protocols with semi-trusted third party. | 2004-07-01 | Paper |
| High performance sparse static solver in finite element analyses with loop-unrolling. | 2003-08-13 | Paper |