Publication | Date of Publication | Type |
---|
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms | 2024-03-14 | Paper |
On the complexity of computational problems associated with simple stochastic games | 2024-01-29 | Paper |
On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes | 2023-12-12 | Paper |
Explicit non-malleable codes from bipartite graphs | 2023-08-10 | Paper |
Attribute based tracing for securing group signatures against centralized authorities | 2023-08-04 | Paper |
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness | 2023-06-30 | Paper |
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions | 2021-10-21 | Paper |
Visual secret sharing scheme with distributed levels of importance of shadows | 2021-08-31 | Paper |
Theory and application of computationally-independent one-way functions: interactive proof of ability -- revisited | 2021-08-31 | Paper |
Analysis of variance of graph-clique mining for scalable proof of work | 2019-10-31 | Paper |
Yet another note on block withholding attack on bitcoin mining pools | 2018-10-18 | Paper |
Improving linear cryptanalysis of LOKI91 by probabilistic counting method | 2018-05-09 | Paper |
A multivariate quadratic challenge toward post-quantum generation cryptography | 2017-06-22 | Paper |
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters | 2017-01-06 | Paper |
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies | 2016-07-25 | Paper |
Attribute-Based Two-Tier Signatures: Definition and Construction | 2016-05-19 | Paper |
A Multivariate Encryption Scheme with Rainbow | 2016-04-21 | Paper |
CCA-Secure Keyed-Fully Homomorphic Encryption | 2016-04-13 | Paper |
Security Model and Analysis of FHMQV, Revisited | 2015-12-02 | Paper |
A security analysis of uniformly-layered Rainbow defined over non-commutative rings | 2015-11-10 | Paper |
Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU | 2015-11-04 | Paper |
Fine-Grained Conditional Proxy Re-Encryption and Application | 2015-09-29 | Paper |
A note on the security of KHL scheme | 2015-09-25 | Paper |
Plaintext checkable encryption with designated checker | 2015-04-14 | Paper |
On zero-knowledge proofs (extended abstract) | 2014-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q2848482 | 2013-09-26 | Paper |
Multivariate Signature Scheme Using Quadratic Forms | 2013-06-14 | Paper |
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography | 2013-04-04 | Paper |
Secure Keyword Search Using Bloom Filter with Specified Character Positions | 2012-11-06 | Paper |
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control | 2012-11-01 | Paper |
Reducing the Key Size of Rainbow Using Non-commutative Rings | 2012-06-08 | Paper |
General Fault Attacks on Multivariate Public Key Cryptosystems | 2011-11-25 | Paper |
A Security Analysis of Uniformly-Layered Rainbow | 2011-11-25 | Paper |
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems | 2011-05-19 | Paper |
Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network | 2010-11-03 | Paper |
Adaptive and Composable Non-committing Encryptions | 2010-10-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q5747908 | 2010-09-14 | Paper |
Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks | 2010-05-10 | Paper |
Reconsidering Data Logging in Light of Digital Forensics | 2010-05-10 | Paper |
Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
Ternary Subset Difference Method and Its Quantitative Analysis | 2009-02-24 | Paper |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption | 2008-07-25 | Paper |
On the Pseudorandomness of a Modification of KASUMI Type Permutations | 2008-03-17 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043923 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4736440 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4452564 | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4452576 | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4452581 | 2004-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4428361 | 2003-09-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4425743 | 2003-09-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417416 | 2003-07-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413856 | 2003-07-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412997 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412998 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4413337 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408459 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4408470 | 2003-06-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4797790 | 2003-03-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536260 | 2003-01-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536276 | 2003-01-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536638 | 2002-11-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536642 | 2002-11-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536672 | 2002-11-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501509 | 2002-08-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q2757257 | 2001-11-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950049 | 2001-10-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950060 | 2001-10-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721119 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721168 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707604 | 2001-04-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4505376 | 2000-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314039 | 2000-06-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314040 | 2000-06-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4314045 | 2000-06-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4485860 | 2000-06-20 | Paper |
https://portal.mardi4nfdi.de/entity/Q4937861 | 2000-02-20 | Paper |
A key escrow system with protecting user's privacy by blind decoding | 2000-02-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q4263432 | 2000-02-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4703859 | 1999-12-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4253364 | 1999-11-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4253434 | 1999-11-02 | Paper |
Divertible and subliminal-free zero-knowledge proofs for languages | 1999-09-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4318697 | 1999-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4381399 | 1999-01-10 | Paper |
A structural comparison of the computational difficulty of breaking discrete log cryptosystems | 1999-01-03 | Paper |
An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy | 1998-08-13 | Paper |
Practical proofs of knowledge without relying on theoretical proofs of membership on languages | 1998-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373608 | 1998-06-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4373644 | 1998-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341687 | 1998-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840091 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840101 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249256 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341711 | 1997-07-20 | Paper |
A short certificate of the number of universal optimal strategies for stopping simple stochastic games | 1997-02-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279694 | 1994-11-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4035725 | 1993-05-18 | Paper |
On the Complexity of Hyperelliptic Discrete Logarithm Problem | 1993-05-18 | Paper |
Fuchsian Systems Associated with the $P^2 (\mathbb{F}_2 )$-Arrangement | 1989-01-01 | Paper |
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE | 1988-01-01 | Paper |