| Publication | Date of Publication | Type |
|---|
| The ECCA Security of Hybrid Encryptions | 2022-12-09 | Paper |
| The KDM-CCA Security of REACT | 2022-12-09 | Paper |
| On the linear complexity of feedforward clock-controlled sequence | 2022-07-01 | Paper |
| A new class of \(p\)-ary regular bent functions | 2021-05-12 | Paper |
| New quadratic bent functions in polynomial forms with coefficients in extension fields | 2019-08-27 | Paper |
| Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves | 2017-11-03 | Paper |
| Construction of efficient MDS matrices based on block circulant matrices for lightweight application | 2017-07-28 | Paper |
| The Weight Distributions of Cyclic Codes and Elliptic Curves | 2017-06-08 | Paper |
| Network coding signature schemes against related-key attacks in the random oracle model | 2017-05-19 | Paper |
| A semantically secure public key cryptoscheme using bit-pair shadows | 2016-11-24 | Paper |
| A note on semi-bent and hyper-bent Boolean functions | 2015-12-02 | Paper |
| The Gallant-Lambert-Vanstone decomposition revisited | 2015-12-02 | Paper |
| Implementing optimized pairings with elliptic nets | 2015-11-20 | Paper |
| Some techniques for faster scalar multiplication on GLS curves | 2015-11-05 | Paper |
| A public key cryptoscheme using bit-pairs with provable semantical security | 2015-10-29 | Paper |
| Cryptography on twisted Edwards curves over local fields | 2015-08-05 | Paper |
| Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition | 2015-06-24 | Paper |
| A note on cyclic codes from APN functions | 2014-10-02 | Paper |
| Generation and Tate pairing computation of ordinary elliptic curves with embedding degree one | 2014-09-29 | Paper |
| On algorithmic aspects of the \(\ell\)-torsion of Brauer groups | 2013-11-19 | Paper |
| Faster pairing computation on genus \(2\) hyperelliptic curves | 2013-03-28 | Paper |
| Pseudorandom Generators Based on Subcovers for Finite Groups | 2013-01-07 | Paper |
| Implementing the 4-dimensional GLV method on GLS elliptic curves with \(j\)-invariant 0 | 2012-04-04 | Paper |
| An optimal multiplication algorithm for the \(\eta_T\) pairing over \(F_{3^{6m}}\) | 2011-09-29 | Paper |
| The pairing computation on binary Edwards curves | 2011-09-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3170750 | 2011-09-29 | Paper |
| A generalization of Verheul's theorem for some ordinary curves | 2011-07-29 | Paper |
| Hierarchical management scheme by local fields | 2011-06-24 | Paper |
| Approximation calculations on the elliptic curves over unramified extensions of 2-adic number fields | 2010-02-12 | Paper |
| Some lower bounds for the spectral radius of matrices using traces | 2010-02-09 | Paper |
| Cryptography on elliptic curves over \(p\) -adic number fields | 2008-05-07 | Paper |
| A model of hierarchical key assignment scheme | 2007-06-01 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4527229 | 2002-01-20 | Paper |
| Onp-series and the mullineux conjecture | 1999-12-20 | Paper |
| On properties of the Mullineux map with an application to Schur modules | 1999-11-22 | Paper |
| A break of public key cryptosystem PKCY | 1998-07-03 | Paper |
| On mullineux' conjecture in the representation theory of symmetric groups | 1998-06-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4320276 | 1995-01-19 | Paper |