| Publication | Date of Publication | Type |
|---|
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption Information Security Practice and Experience | 2022-12-09 | Paper |
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016 Information Security Practice and Experience | 2022-12-09 | Paper |
| Annealing-based algorithm for solving CVP and SVP | 2022-11-25 | Paper |
Higher Order Differential Attack of a CAST Cipher Fast Software Encryption | 2018-05-09 | Paper |
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors Journal of Mathematical Cryptology | 2017-03-16 | Paper |
Computational hardness of IFP and ECDLP Applicable Algebra in Engineering, Communication and Computing | 2017-01-26 | Paper |
Secret computation of purchase history data using somewhat homomorphic encryption Pacific Journal of Mathematics for Industry | 2015-11-10 | Paper |
Secure statistical analysis using RLWE-based homomorphic encryption Information Security and Privacy | 2015-10-20 | Paper |
Practical packing method in somewhat homomorphic encryption Data Privacy Management and Autonomous Spontaneous Security | 2015-10-01 | Paper |
Packed homomorphic encryption based on ideal lattices and its application to biometrics Security Engineering and Intelligence Informatics | 2014-09-30 | Paper |
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption Journal of Mathematical Cryptology | 2014-09-17 | Paper |
How to construct sufficient conditions for hash functions Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices Public Key Infrastructures, Services and Applications | 2014-08-11 | Paper |
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption Information Security and Privacy | 2014-07-24 | Paper |
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397) Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
| On random walks of Pollard's rho method for the ECDLP on Koblitz curves | 2013-01-25 | Paper |
On the strength comparison of the ECDLP and the IFP Lecture Notes in Computer Science | 2012-09-25 | Paper |
On the number of the pairing-friendly curves International Journal of Pure and Applied Mathematics | 2012-09-21 | Paper |
Preimage attacks on full-ARIRANG: analysis of DM-mode with middle feed-forward Information Security Applications | 2012-08-17 | Paper |
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing Information Security Practice and Experience | 2012-06-29 | Paper |
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160 Information Security and Cryptology | 2011-07-29 | Paper |
Preimage attacks on full-ARIRANG (poster) Information Security and Privacy | 2011-07-07 | Paper |
Matrix representation of conditions for the collision attack of SHA-1 and its application to the message modification Advances in Information and Computer Security | 2010-11-09 | Paper |
A New Strategy for Finding a Differential Path of SHA-1 Information Security and Privacy | 2009-03-06 | Paper |
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
Experiments on the Linear Algebra Step in the Number Field Sieve Advances in Information and Computer Security | 2008-07-25 | Paper |
Improved Collision Search for SHA-0 Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts Cryptography and Coding | 2008-03-07 | Paper |
Low-density attack revisited Designs, Codes and Cryptography | 2007-09-20 | Paper |
| scientific article; zbMATH DE number 2089316 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2089125 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2089128 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2043317 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1952898 (Why is no real title available?) | 2003-07-24 | Paper |
| scientific article; zbMATH DE number 1418259 (Why is no real title available?) | 2000-03-19 | Paper |
| scientific article; zbMATH DE number 1304279 (Why is no real title available?) | 2000-02-15 | Paper |
| scientific article; zbMATH DE number 1304112 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1380841 (Why is no real title available?) | 1999-12-20 | Paper |
| scientific article; zbMATH DE number 1380865 (Why is no real title available?) | 1999-12-20 | Paper |
| scientific article; zbMATH DE number 1302847 (Why is no real title available?) | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1107694 (Why is no real title available?) | 1998-01-21 | Paper |
Localization and primary decomposition of polynomial ideals Journal of Symbolic Computation | 1997-03-06 | Paper |
A Gröbner basis method for modules over rings of differential operators Journal of Symbolic Computation | 1995-04-04 | Paper |