| Publication | Date of Publication | Type |
|---|
| Experiments and resource analysis of Shor's factorization using a quantum simulator | 2024-05-31 | Paper |
| Extended attacks on ECDSA with noisy multiple bit nonce leakages | 2024-05-31 | Paper |
| HS-based error correction algorithm for noisy binary GCD side-channel sequences | 2023-11-09 | Paper |
| d-Multiplicative Secret Sharing for Multipartite Adversary Structures | 2023-11-02 | Paper |
| Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures | 2023-04-28 | Paper |
| Bounds in Various Generalized Settings of the Discrete Logarithm Problem | 2022-07-01 | Paper |
| Efficient noise generation to achieve differential privacy with applications to secure multiparty computation | 2022-06-17 | Paper |
| Cryptanalysis of the RSA variant based on cubic Pell equation | 2021-10-06 | Paper |
| Recovering CRT-RSA secret keys from noisy square-and-multiply sequences in the sliding window method | 2021-06-08 | Paper |
| Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments | 2021-02-25 | Paper |
| Certifying variant of RSA with generalized moduli | 2021-01-18 | Paper |
| Strong security of linear ramp secret sharing schemes with general access structures | 2020-10-07 | Paper |
| Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents | 2020-09-17 | Paper |
| Improved CRT-RSA secret key recovery method from sliding window leakage | 2020-07-08 | Paper |
| Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
| Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes | 2020-03-23 | Paper |
| Improved Differential Fault Analysis on Camellia-128 | 2019-12-05 | Paper |
| Attacking noisy secret CRT-RSA exponents in binary method | 2019-03-29 | Paper |
| Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound | 2019-02-20 | Paper |
| Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits | 2018-10-18 | Paper |
| A Deterministic Algorithm for Computing Divisors in an Interval | 2018-09-26 | Paper |
| Cryptanalysis of RSA variants with modified Euler quotient | 2018-07-17 | Paper |
| Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
| Improved factoring attacks on multi-prime RSA with small prime difference | 2017-08-25 | Paper |
| Solving the DLP with low Hamming weight product exponents and improved attacks on the GPS identification scheme | 2017-08-25 | Paper |
| A Tool Kit for Partial Key Exposure Attacks on RSA | 2017-04-12 | Paper |
| Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise | 2017-04-12 | Paper |
| Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli | 2016-10-27 | Paper |
| Partial key exposure attacks on RSA with multiple exponent pairs | 2016-09-02 | Paper |
| Generalized hardness assumption for self-bilinear map with auxiliary information | 2016-09-02 | Paper |
| Private information retrieval with preprocessing based on the approximate GCD problem | 2016-05-19 | Paper |
| Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound | 2016-04-13 | Paper |
| How to generalize RSA cryptanalyses | 2016-04-13 | Paper |
| Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents | 2016-03-10 | Paper |
| An improved attack for recovering noisy RSA secret keys and its countermeasure | 2016-01-27 | Paper |
| Constructing subspace membership encryption through inner product encryption | 2015-09-29 | Paper |
| General bounds for small inverse problems and its applications to multi-prime RSA | 2015-09-11 | Paper |
| RSA meets DPA: recovering RSA secret keys from noisy analog data | 2015-07-21 | Paper |
| On the security proof of an authentication protocol from Eurocrypt 2011 | 2015-05-27 | Paper |
| Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues | 2014-10-14 | Paper |
| Factorization of Square-Free Integers with High Bits Known | 2014-08-21 | Paper |
| How to construct sufficient conditions for hash functions | 2014-08-21 | Paper |
| Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2014-08-07 | Paper |
| Cryptanalysis of RSA with multiple small secret exponents | 2014-07-24 | Paper |
| A framework and compact constructions for non-monotonic attribute-based encryption | 2014-03-25 | Paper |
| Better lattice constructions for solving multivariate linear equations modulo unknown divisors | 2013-06-28 | Paper |
| Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties | 2013-06-04 | Paper |
| Recovering RSA secret keys from noisy key bits with erasures and errors | 2013-04-19 | Paper |
| Secret handshake scheme with request-based-revealing | 2013-03-28 | Paper |
| On optimal bounds of small inverse problems and approximate GCD problems with higher degree | 2012-11-09 | Paper |
| Symmetric inner-product predicate encryption based on three groups | 2012-11-06 | Paper |
| Optimal bounds for multi-prime \(\Phi \)-hiding assumption | 2012-09-07 | Paper |
| Faster algorithm for solving hard knapsacks for moderate message length | 2012-09-07 | Paper |
| Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication | 2012-07-20 | Paper |
| Space efficient signature schemes from the RSA assumption | 2012-07-20 | Paper |
| Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
| Two-dimensional representation of cover free families and its applications: short signatures and more | 2012-06-08 | Paper |
| A unified framework for small secret exponent attack on RSA | 2012-06-08 | Paper |
| Quantum addition circuits and unbounded fan-out | 2011-10-05 | Paper |
| Generic constructions for chosen-ciphertext secure attribute based encryption | 2011-03-15 | Paper |
| Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption | 2010-10-12 | Paper |
| A New Strategy for Finding a Differential Path of SHA-1 | 2009-03-06 | Paper |
| Sanitizable and Deletable Signature | 2009-02-24 | Paper |
| A fast quantum circuit for addition with few qubits | 2008-11-24 | Paper |
| New Message Difference for MD4 | 2008-09-16 | Paper |
| Provably Secure Electronic Cash Based on Blind Multisignature Schemes | 2008-09-09 | Paper |
| New Definition of Density on Knapsack Cryptosystems | 2008-06-13 | Paper |
| Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function | 2008-06-13 | Paper |
| Small Secret Key Attack on a Variant of RSA (Due to Takagi) | 2008-04-24 | Paper |
| Improved Collision Search for SHA-0 | 2008-04-24 | Paper |
| Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack | 2008-04-24 | Paper |
| New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | 2008-04-15 | Paper |
| Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA | 2007-09-04 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Efficient algorithms for NMR quantum computers with small qubits | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502478 | 2000-09-12 | Paper |
| Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n | 1999-09-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4860616 | 1996-01-16 | Paper |