Publication | Date of Publication | Type |
---|
Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers | 2024-03-18 | Paper |
Weak rotational property and its application | 2023-10-12 | Paper |
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework | 2023-09-07 | Paper |
Asymmetric encryption and signature method with DNA technology | 2022-10-28 | Paper |
Improved Integral Attack on Generalized Feistel Cipher | 2022-10-14 | Paper |
Tweaking key-alternating Feistel block ciphers | 2021-02-23 | Paper |
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys | 2019-11-18 | Paper |
Attacks on the HKM / HFX cryptosystem | 2017-11-15 | Paper |
Transposition of AES Key Schedule | 2017-05-05 | Paper |
Generic attacks on the Lai-Massey scheme | 2017-04-13 | Paper |
Distinguishing properties and applications of higher order derivatives of Boolean functions | 2016-07-08 | Paper |
A unified method for finding impossible differentials of block cipher structures | 2016-01-14 | Paper |
Capacity and Data Complexity in Multidimensional Linear Attack | 2015-12-10 | Paper |
What is the effective key length for a block cipher: an attack on every practical block cipher | 2015-11-20 | Paper |
Attacks on a double length blockcipher-based hash proposal | 2015-11-19 | Paper |
On the Key Schedule of Lightweight Block Ciphers | 2015-09-10 | Paper |
Optimal assignment schemes for general access structures based on linear programming | 2015-03-12 | Paper |
Revisiting key schedule's diffusion in relation with round function's diffusion | 2014-08-01 | Paper |
Pseudorandomness analysis of the (extended) Lai-Massey scheme | 2013-04-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q3165327 | 2012-10-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3170753 | 2011-09-29 | Paper |
Certificateless key-insulated signature without random oracles | 2011-02-02 | Paper |
Formal analysis of authentication in 802.11i | 2011-01-05 | Paper |
On the security of multivariate hash functions | 2011-01-05 | Paper |
Strong key-insulated signature in the standard model | 2011-01-05 | Paper |
Improved efficiency of Kiltz07-KEM | 2010-08-20 | Paper |
An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis | 2010-02-12 | Paper |
The Key-Dependent Attack on Block Ciphers | 2009-12-15 | Paper |
Improved Integral Attacks on MISTY1 | 2009-12-09 | Paper |
A synthetic indifferentiability analysis of some block-cipher-based hash functions | 2009-03-31 | Paper |
Cryptanalysis of the Hash Functions MD4 and RIPEMD | 2008-05-06 | Paper |
Symmetric-key cryptosystem with DNA technology | 2007-10-12 | Paper |
New field of cryptography: DNA cryptography | 2007-03-27 | Paper |
Attacks on fast double block length hash functions | 2001-11-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4499406 | 2000-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4484887 | 2000-06-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4386879 | 1998-05-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365759 | 1998-04-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341765 | 1997-09-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341700 | 1997-08-14 | Paper |
Higher Order Derivatives and Differential Cryptanalysis | 1996-07-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279661 | 1994-02-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4036895 | 1993-05-18 | Paper |
Markov Ciphers and Differential Cryptanalysis | 1993-05-18 | Paper |
Condition for the nonsingularity of a feedback shift-register over a general finite field (Corresp.) | 1987-01-01 | Paper |