| Publication | Date of Publication | Type |
|---|
| Concrete analysis of quantum lattice enumeration | 2024-08-30 | Paper |
| On the security of REDOG | 2024-05-31 | Paper |
| Montgomery Curves and the Montgomery Ladder | 2023-04-21 | Paper |
| Verifying post-quantum signatures in 8 kB of RAM | 2022-03-22 | Paper |
| Sliding Right into Disaster: Left-to-Right Sliding Windows Leak | 2020-06-24 | Paper |
| Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies | 2020-02-06 | Paper |
| CSIDH: an efficient post-quantum commutative group action | 2019-01-23 | Paper |
| HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction | 2018-07-17 | Paper |
| Rounded Gaussians -- fast and secure constant-time sampling for lattice-based crypto | 2018-05-29 | Paper |
| NTRU prime: reducing attack surface at low cost | 2018-04-26 | Paper |
| Lattice Klepto -- turning post-quantum crypto against itself | 2018-04-26 | Paper |
| Flush, Gauss, and reload -- a cache attack on the BLISS lattice-based signature scheme | 2018-02-14 | Paper |
| Short Generators Without Quantum Computers: The Case of Multiquadratics | 2017-06-13 | Paper |
| Dual EC: A Standardized Back Door | 2016-05-02 | Paper |
| Batch NFS | 2016-04-13 | Paper |
| Bad Directions in Cryptographic Hash Functions | 2015-10-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2949487 | 2015-10-01 | Paper |
| SPHINCS: Practical Stateless Hash-Based Signatures | 2015-09-30 | Paper |
| TweetNaCl: A Crypto Library in 100 Tweets | 2015-09-17 | Paper |
| Twisted Hessian Curves | 2015-09-17 | Paper |
| Curve41417: Karatsuba Revisited | 2015-07-21 | Paper |
| Kummer Strikes Back: New DH Speed Records | 2015-01-16 | Paper |
| Hyper-and-elliptic-curve cryptography | 2014-09-05 | Paper |
| Faster Batch Forgery Identification | 2014-08-20 | Paper |
| Computing Small Discrete Logarithms Faster | 2014-08-20 | Paper |
| Non-uniform Cracks in the Concrete: The Power of Free Precomputation | 2013-12-10 | Paper |
| Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild | 2013-12-10 | Paper |
| Never Trust a Bunny | 2013-11-19 | Paper |
| Quantum Algorithms for the Subset-Sum Problem | 2013-06-14 | Paper |
| ECM using Edwards curves | 2013-03-20 | Paper |
| The Security Impact of a New Cryptographic Library | 2012-09-21 | Paper |
| Elliptic Curves for Applications | 2011-12-16 | Paper |
| Wild McEliece Incognito | 2011-11-25 | Paper |
| High-Speed High-Security Signatures | 2011-10-07 | Paper |
| Smaller Decoding Exponents: Ball-Collision Decoding | 2011-08-12 | Paper |
| Really Fast Syndrome-Based Hashing | 2011-06-29 | Paper |
| Faster 2-Regular Information-Set Decoding | 2011-06-08 | Paper |
| Faster computation of the Tate pairing | 2011-04-08 | Paper |
| A complete set of addition laws for incomplete Edwards curves | 2011-04-08 | Paper |
| Wild McEliece | 2011-03-15 | Paper |
| On the Correct Use of the Negation Map in the Pollard rho Method | 2011-03-15 | Paper |
| ECC2K-130 on NVIDIA GPUs | 2010-12-07 | Paper |
| Starfish on Strike | 2010-08-31 | Paper |
| Type-II Optimal Polynomial Bases | 2010-07-20 | Paper |
| Faster Pairing Computations on Curves with High-Degree Twists | 2010-05-28 | Paper |
| FSBday | 2009-12-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3635533 | 2009-07-06 | Paper |
| Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions | 2009-06-08 | Paper |
| ECM on Graphics Cards | 2009-05-12 | Paper |
| Revisiting Pairing Based Group Key Exchange | 2009-02-12 | Paper |
| Attacking and Defending the McEliece Cryptosystem | 2008-11-11 | Paper |
| Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng | 2008-09-09 | Paper |
| Twisted Edwards Curves | 2008-06-13 | Paper |
| Faster Addition and Doubling on Elliptic Curves | 2008-05-15 | Paper |
| Inverted Edwards Coordinates | 2008-04-17 | Paper |
| Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication | 2008-04-11 | Paper |
| Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions | 2008-03-17 | Paper |
| SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2 | 2008-03-17 | Paper |
| Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups | 2008-03-07 | Paper |
| Distribution of some sequences of points on elliptic curves | 2008-02-21 | Paper |
| Coding and Cryptography | 2007-05-02 | Paper |
| Algorithmic Number Theory | 2007-05-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3421465 | 2007-02-13 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5706769 | 2005-11-23 | Paper |
| Algorithmic Number Theory | 2005-08-12 | Paper |
| Certain Exponential Sums and Random Walks on Elliptic Curves | 2005-06-23 | Paper |
| Koblitz curve cryptosystems | 2005-06-01 | Paper |
| Formulae for arithmetic on genus 2 hyperelliptic curves | 2005-04-15 | Paper |
| Collisions in fast generation of ideal classes and points on hyperelliptic and elliptic curves | 2005-04-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4665918 | 2005-04-11 | Paper |
| On using expansions to the base of −2 | 2004-12-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4808631 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434888 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4426684 | 2003-09-16 | Paper |
| Interpolation of the discrete logarithm in \(\mathbb{F}_{q}\) by Boolean functions and by polynomials in several variables modulo a divisor of \(q-1\). | 2003-06-10 | Paper |
| Linear complexity of the discrete logarithm | 2003-04-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4530230 | 2002-06-02 | Paper |
| Incomplete character sums over finite fields and their application to the interpolation of the discrete logarithm by Boolean functions | 2002-02-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2762749 | 2002-01-09 | Paper |
| Interpolation of the discrete logarithm in finite fields by Boolean functions | 2001-10-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2712122 | 2001-05-06 | Paper |
| Factoring polynomials over arbitrary finite fields | 2000-08-21 | Paper |