| Publication | Date of Publication | Type |
|---|
| Algorithmic views of vectorized polynomial multipliers -- NTRU | 2024-10-23 | Paper |
| Certified verification for algebraic abstraction | 2024-02-01 | Paper |
| \textsc{CoqCryptoLine}: a verified model checker with certified results | 2024-01-12 | Paper |
| Efficient Multiplication of Somewhat Small Integers Using Number-Theoretic Transforms | 2023-01-18 | Paper |
| A physical study of the LLL algorithm | 2023-01-12 | Paper |
| CoqQFBV: a scalable certified SMT quantifier-free bit-vector solver | 2022-03-25 | Paper |
| Verifying post-quantum signatures in 8 kB of RAM | 2022-03-22 | Paper |
| The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes | 2021-12-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5009416 | 2021-08-04 | Paper |
| A physical study of the LLL algorithm | 2021-06-03 | Paper |
| Frobenius Additive Fast Fourier Transform | 2020-09-09 | Paper |
| HMFEv -- an efficient multivariate signature scheme | 2018-09-12 | Paper |
| Asymptotically faster quantum algorithms to solve multivariate quadratic equations | 2018-06-22 | Paper |
| Implementing Joux-Vitse's crossbred algorithm for solving \(\mathcal M\mathcal Q\) systems over \(\mathbb F_2\) on GPUs | 2018-06-22 | Paper |
| Faster Multiplication for Long Binary Polynomials | 2017-08-31 | Paper |
| Gauss Sieve Algorithm on GPUs | 2017-04-12 | Paper |
| Design Principles for HFEv- Based Multivariate Signature Schemes | 2016-06-10 | Paper |
| A Practical Attack on Patched MIFARE Classic | 2015-12-02 | Paper |
| Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs | 2015-10-01 | Paper |
| Tuning GaussSieve for Speed | 2015-09-17 | Paper |
| Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics | 2015-05-27 | Paper |
| Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables | 2013-12-10 | Paper |
| Degree of Regularity for HFEv and HFEv- | 2013-06-14 | Paper |
| Solving Quadratic Equations with XL on Parallel Architectures | 2012-11-13 | Paper |
| Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation | 2012-09-25 | Paper |
| SHA-3 on ARM11 Processors | 2012-07-23 | Paper |
| Public-Key Cryptography from New Multivariate Quadratic Assumptions | 2012-07-20 | Paper |
| High-Speed High-Security Signatures | 2011-10-07 | Paper |
| ECC2K-130 on NVIDIA GPUs | 2010-12-07 | Paper |
| Efficient String-Commitment from Weak Bit-Commitment | 2010-12-07 | Paper |
| Fast Exhaustive Search for Polynomial Systems in ${\mathbb{F}_2}$ | 2010-08-17 | Paper |
| SSE Implementation of Multivariate PKCs on Modern x86 CPUs | 2009-11-10 | Paper |
| ECM on Graphics Cards | 2009-05-12 | Paper |
| Square, a New Multivariate Encryption Scheme | 2009-04-29 | Paper |
| Multivariate Public Key Cryptography | 2009-03-12 | Paper |
| Multivariates Polynomials for Hashing | 2009-02-10 | Paper |
| Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$ | 2008-11-11 | Paper |
| Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-Derivatives | 2008-11-11 | Paper |
| Analysis of QUAD | 2008-09-16 | Paper |
| A Crowning Moment for Wiener Indices | 2008-09-01 | Paper |
| Could SFLASH be Repaired? | 2008-08-19 | Paper |
| New Differential-Algebraic Attacks and Reparametrization of Rainbow | 2008-06-13 | Paper |
| All in the XL Family: Theory and Practice | 2008-03-17 | Paper |
| Generalized Wiener indices of zigzagging pentachains | 2007-10-12 | Paper |
| ℓ-Invertible Cycles for $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic ( ${\mathcal{MQ}}$ ) Public Key Cryptography | 2007-09-04 | Paper |
| The behavior of Wiener indices and polynomials of graphs under five graph decorations | 2007-06-29 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Information Security and Privacy | 2006-06-22 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4471579 | 2004-07-28 | Paper |
| Presorting algorithms: an average-case point of view | 2000-08-21 | Paper |
| From ternary strings to Wiener indices of benzenoid chains | 1997-05-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4332810 | 1997-04-06 | Paper |
| Wiener indices of hex carpets---from hexagon models to square grids | 1996-07-18 | Paper |
| Zigging and zagging in pentachains | 1995-07-26 | Paper |