Publication | Date of Publication | Type |
---|
d-Multiplicative Secret Sharing for Multipartite Adversary Structures | 2023-11-02 | Paper |
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures | 2023-04-28 | Paper |
Bounds in Various Generalized Settings of the Discrete Logarithm Problem | 2022-07-01 | Paper |
Efficient noise generation to achieve differential privacy with applications to secure multiparty computation | 2022-06-17 | Paper |
Cryptanalysis of the RSA variant based on cubic Pell equation | 2021-10-06 | Paper |
Recovering CRT-RSA secret keys from noisy square-and-multiply sequences in the sliding window method | 2021-06-08 | Paper |
Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments | 2021-02-25 | Paper |
Certifying variant of RSA with generalized moduli | 2021-01-18 | Paper |
Strong security of linear ramp secret sharing schemes with general access structures | 2020-10-07 | Paper |
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents | 2020-09-17 | Paper |
Improved CRT-RSA secret key recovery method from sliding window leakage | 2020-07-08 | Paper |
Generic hardness of inversion on ring and its relation to self-bilinear map | 2020-04-21 | Paper |
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes | 2020-03-23 | Paper |
Improved Differential Fault Analysis on Camellia-128 | 2019-12-05 | Paper |
Attacking noisy secret CRT-RSA exponents in binary method | 2019-03-29 | Paper |
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound | 2019-02-20 | Paper |
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits | 2018-10-18 | Paper |
A Deterministic Algorithm for Computing Divisors in an Interval | 2018-09-26 | Paper |
Cryptanalysis of RSA variants with modified Euler quotient | 2018-07-17 | Paper |
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications | 2018-01-05 | Paper |
Solving the DLP with low Hamming weight product exponents and improved attacks on the GPS identification scheme | 2017-08-25 | Paper |
Improved factoring attacks on multi-prime RSA with small prime difference | 2017-08-25 | Paper |
A Tool Kit for Partial Key Exposure Attacks on RSA | 2017-04-12 | Paper |
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise | 2017-04-12 | Paper |
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli | 2016-10-27 | Paper |
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs | 2016-09-02 | Paper |
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information | 2016-09-02 | Paper |
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem | 2016-05-19 | Paper |
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound | 2016-04-13 | Paper |
How to Generalize RSA Cryptanalyses | 2016-04-13 | Paper |
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents | 2016-03-10 | Paper |
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure | 2016-01-27 | Paper |
Constructing Subspace Membership Encryption through Inner Product Encryption | 2015-09-29 | Paper |
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA | 2015-09-11 | Paper |
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data | 2015-07-21 | Paper |
On the Security Proof of an Authentication Protocol from Eurocrypt 2011 | 2015-05-27 | Paper |
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues | 2014-10-14 | Paper |
Factorization of Square-Free Integers with High Bits Known | 2014-08-21 | Paper |
How to Construct Sufficient Conditions for Hash Functions | 2014-08-21 | Paper |
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications | 2014-08-07 | Paper |
Cryptanalysis of RSA with Multiple Small Secret Exponents | 2014-07-24 | Paper |
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption | 2014-03-25 | Paper |
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors | 2013-06-28 | Paper |
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties | 2013-06-04 | Paper |
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors | 2013-04-19 | Paper |
Secret handshake scheme with request-based-revealing | 2013-03-28 | Paper |
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree | 2012-11-09 | Paper |
Symmetric Inner-Product Predicate Encryption Based on Three Groups | 2012-11-06 | Paper |
Optimal Bounds for Multi-Prime Φ-Hiding Assumption | 2012-09-07 | Paper |
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length | 2012-09-07 | Paper |
Space Efficient Signature Schemes from the RSA Assumption | 2012-07-20 | Paper |
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication | 2012-07-20 | Paper |
A Unified Framework for Small Secret Exponent Attack on RSA | 2012-06-08 | Paper |
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More | 2012-06-08 | Paper |
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption | 2012-06-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q3171620 | 2011-10-05 | Paper |
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption | 2011-03-15 | Paper |
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption | 2010-10-12 | Paper |
A New Strategy for Finding a Differential Path of SHA-1 | 2009-03-06 | Paper |
Sanitizable and Deletable Signature | 2009-02-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q3540814 | 2008-11-24 | Paper |
New Message Difference for MD4 | 2008-09-16 | Paper |
Provably Secure Electronic Cash Based on Blind Multisignature Schemes | 2008-09-09 | Paper |
New Definition of Density on Knapsack Cryptosystems | 2008-06-13 | Paper |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function | 2008-06-13 | Paper |
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack | 2008-04-24 | Paper |
Small Secret Key Attack on a Variant of RSA (Due to Takagi) | 2008-04-24 | Paper |
Improved Collision Search for SHA-0 | 2008-04-24 | Paper |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | 2008-04-15 | Paper |
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA | 2007-09-04 | Paper |
Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
Efficient algorithms for NMR quantum computers with small qubits | 2004-09-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q4502478 | 2000-09-12 | Paper |
Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n | 1999-09-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4860616 | 1996-01-16 | Paper |