| Publication | Date of Publication | Type |
|---|
| Tree parity machine-based symmetric encryption: a hybrid approach | 2024-10-29 | Paper |
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms IEEE Transactions on Information Theory | 2024-03-14 | Paper |
On the complexity of computational problems associated with simple stochastic games Lecture Notes in Computer Science | 2024-01-29 | Paper |
On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes Lecture Notes in Computer Science | 2023-12-12 | Paper |
Explicit non-malleable codes from bipartite graphs Arithmetic of Finite Fields | 2023-08-10 | Paper |
Attribute based tracing for securing group signatures against centralized authorities Information Security Practice and Experience | 2023-08-04 | Paper |
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness Information Security Practice and Experience | 2023-06-30 | Paper |
| Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis | 2023-01-25 | Paper |
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions Theoretical Computer Science | 2021-10-21 | Paper |
| Theory and application of computationally-independent one-way functions: interactive proof of ability -- revisited | 2021-08-31 | Paper |
| Visual secret sharing scheme with distributed levels of importance of shadows | 2021-08-31 | Paper |
| Analysis of variance of graph-clique mining for scalable proof of work | 2019-10-31 | Paper |
| Yet another note on block withholding attack on bitcoin mining pools | 2018-10-18 | Paper |
Improving linear cryptanalysis of LOKI91 by probabilistic counting method Fast Software Encryption | 2018-05-09 | Paper |
A multivariate quadratic challenge toward post-quantum generation cryptography ACM Communications in Computer Algebra | 2017-06-22 | Paper |
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters Lecture Notes in Computer Science | 2017-01-06 | Paper |
On the application of clique problem for proof-of-work in cryptocurrencies Information Security and Cryptology | 2016-07-25 | Paper |
Attribute-based two-tier signatures: definition and construction Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
A multivariate encryption scheme with Rainbow Information and Communications Security | 2016-04-21 | Paper |
CCA-secure keyed-fully homomorphic encryption Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Security model and analysis of FHMQV, revisited Information Security and Cryptology | 2015-12-02 | Paper |
A security analysis of uniformly-layered Rainbow defined over non-commutative rings Pacific Journal of Mathematics for Industry | 2015-11-10 | Paper |
Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU Springer Proceedings in Mathematics & Statistics | 2015-11-04 | Paper |
Fine-grained conditional proxy re-encryption and application Provable Security | 2015-09-29 | Paper |
A note on the security of KHL scheme Theoretical Computer Science | 2015-09-25 | Paper |
Plaintext checkable encryption with designated checker Advances in Mathematics of Communications | 2015-04-14 | Paper |
On zero-knowledge proofs (extended abstract) Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
| Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic | 2013-09-26 | Paper |
Multivariate Signature Scheme Using Quadratic Forms Post-Quantum Cryptography | 2013-06-14 | Paper |
Application of scalar multiplication of Edwards curves to pairing-based cryptography Advances in Information and Computer Security | 2013-04-04 | Paper |
Secure keyword search using Bloom filter with specified character positions Provable Security | 2012-11-06 | Paper |
Multi-user keyword search scheme for secure data sharing with fine-grained access control Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Reducing the key size of rainbow using non-commutative rings Lecture Notes in Computer Science | 2012-06-08 | Paper |
A security analysis of uniformly-layered Rainbow. Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm Post-Quantum Cryptography | 2011-11-25 | Paper |
General Fault Attacks on Multivariate Public Key Cryptosystems Post-Quantum Cryptography | 2011-11-25 | Paper |
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems Information Security Practice and Experience | 2011-05-19 | Paper |
Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network Lecture Notes in Computer Science | 2010-11-03 | Paper |
Adaptive and composable non-committing encryptions Information Security and Privacy | 2010-10-25 | Paper |
| On the zero-run length of a signed binary representation | 2010-09-14 | Paper |
Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks Advances in Information Security and Its Application | 2010-05-10 | Paper |
Reconsidering data logging in light of digital forensics Advances in Information Security and Its Application | 2010-05-10 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Ternary Subset Difference Method and Its Quantitative Analysis Information Security Applications | 2009-02-24 | Paper |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption Advances in Information and Computer Security | 2008-07-25 | Paper |
On the Pseudorandomness of a Modification of KASUMI Type Permutations Lecture Notes in Computer Science | 2008-03-17 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| scientific article; zbMATH DE number 2085418 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2085211 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2048540 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2048532 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2048542 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 1980971 (Why is no real title available?) | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1979310 (Why is no real title available?) | 2003-09-11 | Paper |
| scientific article; zbMATH DE number 1955802 (Why is no real title available?) | 2003-07-29 | Paper |
| scientific article; zbMATH DE number 1951607 (Why is no real title available?) | 2003-07-21 | Paper |
| scientific article; zbMATH DE number 1950624 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950360 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950359 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1941254 (Why is no real title available?) | 2003-06-29 | Paper |
| scientific article; zbMATH DE number 1941262 (Why is no real title available?) | 2003-06-29 | Paper |
| scientific article; zbMATH DE number 1878328 (Why is no real title available?) | 2003-03-09 | Paper |
| scientific article; zbMATH DE number 1759337 (Why is no real title available?) | 2003-01-25 | Paper |
| scientific article; zbMATH DE number 1759323 (Why is no real title available?) | 2003-01-25 | Paper |
| scientific article; zbMATH DE number 1759644 (Why is no real title available?) | 2002-11-24 | Paper |
| scientific article; zbMATH DE number 1759646 (Why is no real title available?) | 2002-11-24 | Paper |
| scientific article; zbMATH DE number 1759670 (Why is no real title available?) | 2002-11-23 | Paper |
| scientific article; zbMATH DE number 1500497 (Why is no real title available?) | 2002-08-05 | Paper |
| scientific article; zbMATH DE number 1676655 (Why is no real title available?) | 2001-11-25 | Paper |
| scientific article; zbMATH DE number 1440061 (Why is no real title available?) | 2001-10-03 | Paper |
| scientific article; zbMATH DE number 1440070 (Why is no real title available?) | 2001-10-02 | Paper |
| scientific article; zbMATH DE number 1612527 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1612501 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1583944 (Why is no real title available?) | 2001-04-03 | Paper |
| scientific article; zbMATH DE number 1511692 (Why is no real title available?) | 2000-09-27 | Paper |
| scientific article; zbMATH DE number 697823 (Why is no real title available?) | 2000-06-21 | Paper |
| scientific article; zbMATH DE number 697822 (Why is no real title available?) | 2000-06-21 | Paper |
| scientific article; zbMATH DE number 697828 (Why is no real title available?) | 2000-06-21 | Paper |
| scientific article; zbMATH DE number 1461531 (Why is no real title available?) | 2000-06-20 | Paper |
| scientific article; zbMATH DE number 1404241 (Why is no real title available?) | 2000-02-20 | Paper |
A key escrow system with protecting user's privacy by blind decoding Lecture Notes in Computer Science | 2000-02-15 | Paper |
| scientific article; zbMATH DE number 1341874 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1372657 (Why is no real title available?) | 1999-12-01 | Paper |
| scientific article; zbMATH DE number 1322342 (Why is no real title available?) | 1999-11-08 | Paper |
| scientific article; zbMATH DE number 1322402 (Why is no real title available?) | 1999-11-02 | Paper |
Divertible and subliminal-free zero-knowledge proofs for languages Journal of Cryptology | 1999-09-22 | Paper |
| scientific article; zbMATH DE number 708809 (Why is no real title available?) | 1999-08-30 | Paper |
| scientific article; zbMATH DE number 1136088 (Why is no real title available?) | 1999-01-10 | Paper |
A structural comparison of the computational difficulty of breaking discrete log cryptosystems Journal of Cryptology | 1999-01-03 | Paper |
An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy Information Processing Letters | 1998-08-13 | Paper |
Practical proofs of knowledge without relying on theoretical proofs of membership on languages Theoretical Computer Science | 1998-07-22 | Paper |
| scientific article; zbMATH DE number 1107670 (Why is no real title available?) | 1998-06-11 | Paper |
| scientific article; zbMATH DE number 1107699 (Why is no real title available?) | 1998-01-21 | Paper |
| scientific article; zbMATH DE number 1024012 (Why is no real title available?) | 1998-01-14 | Paper |
| scientific article; zbMATH DE number 1186877 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1302786 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1186883 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1024028 (Why is no real title available?) | 1997-07-20 | Paper |
A short certificate of the number of universal optimal strategies for stopping simple stochastic games Information Processing Letters | 1997-02-27 | Paper |
| scientific article; zbMATH DE number 503355 (Why is no real title available?) | 1994-11-29 | Paper |
| scientific article; zbMATH DE number 176556 (Why is no real title available?) | 1993-05-18 | Paper |
On the Complexity of Hyperelliptic Discrete Logarithm Problem Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
Fuchsian Systems Associated with the $P^2 (\mathbb{F}_2 )$-Arrangement SIAM Journal on Mathematical Analysis | 1989-01-01 | Paper |
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE Memoirs of the Faculty of Science, Kyushu University. Series A, Mathematics | 1988-01-01 | Paper |