| Publication | Date of Publication | Type |
|---|
| LIFTS OF THE TERNARY QUADRATIC RESIDUE CODE OF LENGTH 24 AND THEIR WEIGHT ENUMERATORS | 2023-04-12 | Paper |
| Score normalization for a university grades input system using a neural network | 2021-02-18 | Paper |
| New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves | 2020-09-29 | Paper |
| Optimized method for computing odd-degree isogenies on Edwards curves | 2020-05-05 | Paper |
| QUADRATIC RESIDUE CODES OVER p-ADIC INTEGERS AND THEIR PROJECTIONS TO INTEGERS MODULO pe | 2020-02-21 | Paper |
| QUADRATIC RESIDUE CODES OVER GALOIS RINGS | 2020-02-18 | Paper |
| Self-dual codes over ${\mathbb Z}_{p^2}$ of small lengths | 2020-01-08 | Paper |
| The mass formula of self-orthogonal codes over $\mathbf {GF(q)}$ | 2020-01-08 | Paper |
| THE q-ADIC LIFTINGS OF CODES OVER FINITE FIELDS | 2019-12-04 | Paper |
| Cyclic codes over the ring of 4-adic integers of lengths 15, 17 and 19 | 2019-12-04 | Paper |
| Characterizations of network structures using eigenmode analysis | 2017-09-27 | Paper |
| An efficient and secure navigation protocol based on vehicular cloud | 2016-05-06 | Paper |
| Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis | 2015-09-24 | Paper |
| The classification of self-dual modular codes | 2011-10-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3000327 | 2011-05-18 | Paper |
| Operation-efficient subgroups of finite fields | 2010-07-10 | Paper |
| Weakness in a RSA-based password authenticated key exchange protocol | 2010-06-09 | Paper |
| Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption | 2010-06-01 | Paper |
| A Robust Conditional Privacy-Preserving Authentication Protocol in VANET | 2010-04-24 | Paper |
| Efficient Linear Array for Multiplication over NIST Recommended Binary Fields | 2009-07-02 | Paper |
| Modular independence and generator matrices for codes over \(\mathbb{Z}_m\) | 2009-03-31 | Paper |
| OPTIMAL LINEAR CODES OVER ℤm | 2008-02-22 | Paper |
| An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism | 2007-11-15 | Paper |
| Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves | 2007-11-15 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| On modular cyclic codes | 2007-02-14 | Paper |
| Information Security | 2006-10-20 | Paper |
| Codes over the \(p\)-adic integers | 2006-05-29 | Paper |
| Lifted codes and their weight enumerators | 2006-01-10 | Paper |
| IMPLEMENTATION ISSUES FOR ARITHMETIC OVER EXTENSION FIELDS OF CHARACTERISTIC ODD | 2005-12-12 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| A note on the factorization method of Niederreiter | 2005-06-01 | Paper |
| ON THE LINEAR COMPLEXITY OF SOME GENERALIZED CYCLOTOMIC SEQUENCES | 2004-11-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737244 | 2004-08-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043949 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043948 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450734 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413874 | 2003-07-21 | Paper |
| The class number one problem for the non-abelian normal CM-fields of degree 24 and~40 | 2002-02-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4528075 | 2001-08-05 | Paper |
| Permutation polynomials and group permutation polynomials | 2001-05-16 | Paper |
| Construction of the real dihedral number fields of degree 2p. Applications | 1999-09-09 | Paper |
| Permutation polynomials with exponents in an arithmetic progression | 1999-01-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4392147 | 1998-09-13 | Paper |
| Determination of all non-quadratic imaginary cyclic number fields of 2-power degree with relative class number ≤ 20 | 1998-04-20 | Paper |
| Determination of all imaginary abelian sextic number fields with class number ≤ 11 | 1998-01-08 | Paper |
| Gauss sums for orthogonal groups over a finite field of characteristic two | 1997-09-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4872594 | 1996-08-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4273152 | 1995-02-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4079484 | 1975-01-01 | Paper |