| Publication | Date of Publication | Type |
|---|
| Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption | 2022-12-09 | Paper |
| Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016 | 2022-12-09 | Paper |
| Annealing-based algorithm for solving CVP and SVP | 2022-11-25 | Paper |
| Higher Order Differential Attack of a CAST Cipher | 2018-05-09 | Paper |
| Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors | 2017-03-16 | Paper |
| Computational hardness of IFP and ECDLP | 2017-01-26 | Paper |
| Secret computation of purchase history data using somewhat homomorphic encryption | 2015-11-10 | Paper |
| Secure statistical analysis using RLWE-based homomorphic encryption | 2015-10-20 | Paper |
| Practical packing method in somewhat homomorphic encryption | 2015-10-01 | Paper |
| Packed homomorphic encryption based on ideal lattices and its application to biometrics | 2014-09-30 | Paper |
| On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption | 2014-09-17 | Paper |
| How to construct sufficient conditions for hash functions | 2014-08-21 | Paper |
| Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices | 2014-08-11 | Paper |
| Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption | 2014-07-24 | Paper |
| Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397) | 2013-03-19 | Paper |
| On random walks of Pollard's rho method for the ECDLP on Koblitz curves | 2013-01-25 | Paper |
| On the strength comparison of the ECDLP and the IFP | 2012-09-25 | Paper |
| On the number of the pairing-friendly curves | 2012-09-21 | Paper |
| Preimage attacks on full-ARIRANG: analysis of DM-mode with middle feed-forward | 2012-08-17 | Paper |
| Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing | 2012-06-29 | Paper |
| Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160 | 2011-07-29 | Paper |
| Preimage attacks on full-ARIRANG (poster) | 2011-07-07 | Paper |
| Matrix representation of conditions for the collision attack of SHA-1 and its application to the message modification | 2010-11-09 | Paper |
| A New Strategy for Finding a Differential Path of SHA-1 | 2009-03-06 | Paper |
| CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method | 2008-09-16 | Paper |
| Experiments on the Linear Algebra Step in the Number Field Sieve | 2008-07-25 | Paper |
| Improved Collision Search for SHA-0 | 2008-04-24 | Paper |
| How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts | 2008-03-07 | Paper |
| Low-density attack revisited | 2007-09-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046618 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046336 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046340 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4450741 | 2004-02-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4414279 | 2003-07-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941818 | 2000-03-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4251000 | 2000-02-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250810 | 2000-02-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4705547 | 1999-12-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4705577 | 1999-12-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249330 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4373639 | 1998-01-21 | Paper |
| Localization and primary decomposition of polynomial ideals | 1997-03-06 | Paper |
| A Gröbner basis method for modules over rings of differential operators | 1995-04-04 | Paper |