| Publication | Date of Publication | Type |
|---|
| Limitations of the QRQW and EREW PRAM models | 2024-07-05 | Paper |
| Anamorphic signatures: secrecy from a dictator who only permits authentication! | 2024-02-02 | Paper |
| Periodic merging networks | 2023-01-25 | Paper |
| Retrieval of scattered information by EREW, CREW and CRCW PRAMs | 2022-12-09 | Paper |
| Braid Chain Radio Communication | 2022-12-09 | Paper |
| Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense | 2022-02-16 | Paper |
| CTRL-PACE: Controlled Randomness for e-Passport Password Authentication* | 2020-01-24 | Paper |
| Fast integer merging on the EREW PRAM | 2019-12-04 | Paper |
| On Distributed Cardinality Estimation: Random Arcs Recycled | 2019-09-17 | Paper |
| A formal concept of domain pseudonymous signatures | 2018-12-07 | Paper |
| Hard invalidation of electronic signatures | 2018-12-07 | Paper |
| Chip authentication for e-Passports: PACE with chip authentication mapping v2 | 2018-10-18 | Paper |
| On crossroads of privacy protection | 2018-04-20 | Paper |
| Fast generation of random permutations via networks simulation | 2017-12-05 | Paper |
| Controlled randomness -- a defense against backdoors in cryptographic devices | 2017-10-23 | Paper |
| Stamp and Extend – Instant But Undeniable Timestamping Based on Lazy Trees | 2017-01-23 | Paper |
| Pseudonymous Signature on eIDAS Token – Implementation Based Privacy Threats | 2016-09-02 | Paper |
| Supervised Usage of Signature Creation Devices | 2015-12-02 | Paper |
| Stand-by Attacks on E-ID Password Authentication | 2015-11-25 | Paper |
| Periodification scheme | 2015-09-19 | Paper |
| Provable unlinkability against traffic analysis with low message overhead | 2015-08-03 | Paper |
| Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping | 2015-01-13 | Paper |
| Efficient algorithms for leader election in radio networks | 2014-07-25 | Paper |
| Energy efficient alert in single-hop networks of extremely weak devices | 2012-10-11 | Paper |
| From key predistribution to key redistribution | 2012-10-11 | Paper |
| Optimizing Segment Based Document Protection | 2012-06-15 | Paper |
| Private Information Retrieval with a Trusted Hardware Unit – Revisited | 2011-07-29 | Paper |
| Security and Trust in Sensor Networks | 2011-04-05 | Paper |
| Algorithms - ESA 2003 | 2010-03-03 | Paper |
| Step-out group signatures | 2009-08-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3613098 | 2009-03-11 | Paper |
| Anonymity and k-Choice Identities | 2009-02-10 | Paper |
| Step-Out Ring Signatures | 2009-02-03 | Paper |
| A Revocation Scheme Preserving Privacy | 2009-01-15 | Paper |
| Adaptive initialization algorithm for ad hoc radio networks with carrier sensing | 2008-08-14 | Paper |
| Distributed Verification of Mixing - Local Forking Proofs Model | 2008-07-08 | Paper |
| Forward-Secure Key Evolution in Wireless Sensor Networks | 2008-04-15 | Paper |
| Short Ballot Assumption and Threeballot Voting Protocol | 2008-03-07 | Paper |
| Practical Deniable Encryption | 2008-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5445486 | 2008-03-05 | Paper |
| Mathematical Foundations of Computer Science 2003 | 2007-12-07 | Paper |
| Fault Cryptanalysis and the Shrinking Generator | 2007-09-14 | Paper |
| Theory and Applications of Models of Computation | 2007-04-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3368997 | 2007-03-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3421476 | 2007-02-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3421459 | 2007-02-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3421475 | 2007-02-13 | Paper |
| Information Security | 2006-10-20 | Paper |
| Information Security | 2006-10-16 | Paper |
| SOFSEM 2005: Theory and Practice of Computer Science | 2005-12-07 | Paper |
| Experimental and Efficient Algorithms | 2005-11-30 | Paper |
| Efficient simulation of synchronous systems by multi-speed systems | 2005-07-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4808648 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4813187 | 2004-08-12 | Paper |
| Weak communication in single‐hop radio networks: adjusting algorithms to industrial standards | 2003-10-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4550982 | 2002-11-11 | Paper |
| Stochastic kleptography detection | 2002-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4535083 | 2002-06-12 | Paper |
| Delayed path coupling and generating random permutations | 2000-12-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4938672 | 2000-04-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4252298 | 1999-07-08 | Paper |
| Periodic merging networks | 1999-04-12 | Paper |
| Feasible Time-Optimal Algorithms for Boolean Functions on Exclusive-Write Parallel Random-Access Machines | 1997-06-09 | Paper |
| Limits on the power of parallel random access machines with weak forms of write conflict resolution | 1997-03-31 | Paper |
| Fast integer merging on the EREW PRAM | 1997-01-22 | Paper |
| Stack versus sensitivity for one-way automata | 1996-10-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4281540 | 1996-07-29 | Paper |
| Retrieval of scattered information by EREW, CREW, and CRCW PRAMs | 1996-05-27 | Paper |
| Exact lower time bounds for computing Boolean functions on CREW PRAMs | 1994-06-29 | Paper |
| Multihead one-way finite automata | 1992-06-28 | Paper |
| Time Complexity of Boolean Functions on CREW PRAM<scp>s</scp> | 1991-01-01 | Paper |
| One-way multihead finite automata and 2-bounded languages | 1990-01-01 | Paper |
| Reversal Complexity Classes for Alternating Turing Machines | 1990-01-01 | Paper |
| Remarks on sorting and one-way multihead finite automata | 1990-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3359752 | 1990-01-01 | Paper |
| Finite automata, real time processes and counting problems in bounded arithmetics | 1988-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3795237 | 1988-01-01 | Paper |
| Small Grzegorczyk Classes | 1987-01-01 | Paper |
| A generalized Grzegorczyk hierarchy and low complexity classes | 1987-01-01 | Paper |
| A Note on “ℰ*0 = ℰ*2?” Problem | 1987-01-01 | Paper |
| Boolean operations over measure algebras | 1986-01-01 | Paper |
| Restricted Collection and Comprehension Schemata in Weak Set Theories | 1986-01-01 | Paper |