| Publication | Date of Publication | Type |
|---|
How do the arbiter PUFs sample the Boolean function class? | 2024-10-14 | Paper |
Plateaued rotation symmetric Boolean functions on odd number of variables | 2024-09-18 | Paper |
Efficient search for symmetric Boolean functions under constraints on Walsh spectra values | 2024-09-18 | Paper |
Autocorrelation spectra of balanced Boolean functions on an odd number of input variables with maximum absolute value \(<2^{\frac{n+1}2}\) | 2024-09-18 | Paper |
Notion of algebraic immunity and its evaluation related to fast algebraic attacks | 2024-09-18 | Paper |
Results on rotation symmetric bent functions | 2024-09-18 | Paper |
Construction of resilient functions by the concatenation of Boolean functions having nonintersecting Walsh spectra | 2024-09-18 | Paper |
On dihedral group invariant Boolean functions (extended abstract) | 2024-09-18 | Paper |
Balanced Boolean function on 13-variables having nonlinearity greater than the bent concatenation bound | 2024-09-18 | Paper |
Introducing nega-forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra Designs, Codes and Cryptography | 2024-04-03 | Paper |
Improved and formal proposal for device-independent quantum private query * Journal of Physics A: Mathematical and Theoretical | 2024-03-05 | Paper |
Following forrelation -- quantum algorithms in exploring Boolean functions' spectra Advances in Mathematics of Communications | 2023-12-14 | Paper |
Analysis of Boolean functions related to binary input binary output two-party nonlocal games Cryptography and Communications | 2023-11-09 | Paper |
Modifying bent functions to obtain the balanced ones with high nonlinearity Lecture Notes in Computer Science | 2023-08-14 | Paper |
Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions Lecture Notes in Computer Science | 2023-08-14 | Paper |
A proposal for device independent probabilistic quantum oblivious transfer Lecture Notes in Computer Science | 2023-08-14 | Paper |
Differential fault attack on Espresso Lecture Notes in Computer Science | 2023-05-12 | Paper |
Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks Lecture Notes in Computer Science | 2023-05-12 | Paper |
Parity decision tree in classical-quantum separations for certain classes of Boolean functions Quantum Information Processing | 2023-03-17 | Paper |
Certain Observations on ACORN v3 and the Implications to TMDTO Attacks Security, Privacy, and Applied Cryptography Engineering | 2022-12-09 | Paper |
Differential Fault Attack on Grain v1, ACORN v3 and Lizard Security, Privacy, and Applied Cryptography Engineering | 2022-12-09 | Paper |
Improved and practical proposal for measurement device independent quantum dialogue Quantum Information Processing | 2022-11-24 | Paper |
More glimpses of the RC4 internal state array | 2022-07-06 | Paper |
Resolvable block designs in construction of approximate real MUBs that are sparse Cryptography and Communications | 2022-06-13 | Paper |
On the existence and non-existence of some classes of bent-negabent functions Applicable Algebra in Engineering, Communication and Computing | 2022-05-23 | Paper |
Differential Fault Attack on Kreyvium & FLIP IEEE Transactions on Computers | 2022-03-24 | Paper |
Further cryptographic properties of the multiplicative inverse function Discrete Applied Mathematics | 2021-12-07 | Paper |
Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity Finite Fields and their Applications | 2021-11-02 | Paper |
Quantum algorithms for cryptographically significant Boolean functions. An IBMQ experience SpringerBriefs in Computer Science | 2021-07-20 | Paper |
On approximate real mutually unbiased bases in square dimension Cryptography and Communications | 2021-07-13 | Paper |
Glimpses are forever in RC4 amidst the spectre of biases Discrete Applied Mathematics | 2021-05-31 | Paper |
Further clarification on Mantin's digraph repetition bias in RC4 Designs, Codes and Cryptography | 2021-01-25 | Paper |
Differential fault attack on hardware stream ciphers -- a technical survey Combinatorics and Finite Fields | 2020-07-27 | Paper |
Efficient quantum algorithms related to autocorrelation spectrum | 2020-05-12 | Paper |
Vectorial Boolean functions with very low differential-linear uniformity using Maiorana-McFarland type construction | 2020-05-12 | Paper |
RC4: non-randomness in the index \(j\) and some results on its cycles | 2020-05-12 | Paper |
Device independent quantum key distribution using three-party pseudo-telepathy | 2020-05-12 | Paper |
Analysis of the strict avalanche criterion in variants of arbiter-based physically unclonable functions | 2020-05-12 | Paper |
Analysis on Boolean Function in a Restricted (Biased) Domain IEEE Transactions on Information Theory | 2020-01-28 | Paper |
The connection between quadratic bent-negabent functions and the Kerdock code Applicable Algebra in Engineering, Communication and Computing | 2019-12-18 | Paper |
Differential fault attack on SIMON with very few faults | 2019-03-29 | Paper |
Tools in analyzing linear approximation for Boolean functions related to FLIP | 2019-03-29 | Paper |
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile Designs, Codes and Cryptography | 2019-02-20 | Paper |
On hardware implementation of Tang-maitra Boolean functions | 2019-02-15 | Paper |
Modifying Maiorana-McFarland type bent functions for good cryptographic properties and efficient implementation SIAM Journal on Discrete Mathematics | 2019-02-01 | Paper |
A TMDTO Attack Against Lizard IEEE Transactions on Computers | 2018-09-14 | Paper |
Clauser-Horne-Shimony-Holt versus three-party pseudo-telepathy: on the optimal number of samples in device-independent quantum private query Quantum Information Processing | 2018-08-07 | Paper |
Construction of \(n\)-variable \((n\equiv 2\bmod 4)\) balanced Boolean functions with maximum absolute value in autocorrelation spectra \(<2^{\frac{n}{2}}\) IEEE Transactions on Information Theory | 2018-06-27 | Paper |
A Differential Fault Attack on Plantlet IEEE Transactions on Computers | 2018-06-27 | Paper |
A Super-Set of Patterson--Wiedemann Functions: Upper Bounds and Possible Nonlinearities SIAM Journal on Discrete Mathematics | 2018-01-12 | Paper |
Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme IEEE Transactions on Signal Processing | 2017-09-20 | Paper |
High-Performance Hardware Implementation for RC4 Stream Cipher IEEE Transactions on Computers | 2017-07-12 | Paper |
Investigations on Bent and Negabent Functions via the Nega-Hadamard Transform IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Approximate Integer Common Divisor Problem Relates to Implicit Factorization IEEE Transactions on Information Theory | 2017-07-12 | Paper |
A super-set of Patterson-Wiedemann functions -- upper bounds and possible nonlinearities Arithmetic of Finite Fields | 2017-06-13 | Paper |
Quantum algorithms related to \(HN\)-transforms of Boolean functions Codes, Cryptology and Information Security | 2017-06-01 | Paper |
Differential Fault Attack against Grain Family with Very Few Faults and Minimal Assumptions IEEE Transactions on Computers | 2017-05-16 | Paper |
Patterson–Wiedemann Type Functions on 21 Variables With Nonlinearity Greater Than Bent Concatenation Bound IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Probabilistic signature based generalized framework for differential fault analysis of stream ciphers Cryptography and Communications | 2017-03-27 | Paper |
Redefining the transparency order Designs, Codes and Cryptography | 2017-02-10 | Paper |
Observing biases in the state: case studies with Trivium and Trivia-SC Designs, Codes and Cryptography | 2017-02-10 | Paper |
Chosen IV cryptanalysis on reduced round \texttt{ChaCha} and \texttt{Salsa} Discrete Applied Mathematics | 2016-05-18 | Paper |
Application of Grover's algorithm to check non-resiliency of a Boolean function Cryptography and Communications | 2016-05-04 | Paper |
Proving TLS-attack related open biases of RC4 Designs, Codes and Cryptography | 2015-09-30 | Paper |
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Fast Software Encryption | 2015-09-18 | Paper |
Differential power analysis in Hamming weight model: how to choose among (extended) affine equivalent S-boxes Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Efficient quantum algorithms to construct arbitrary Dicke states Quantum Information Processing | 2014-12-12 | Paper |
A Differential Fault Attack on the Grain Family under Reasonable Assumptions Lecture Notes in Computer Science | 2014-08-20 | Paper |
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher Journal of Cryptology | 2014-04-01 | Paper |
Counting Heron triangles with constraints Integers | 2013-10-25 | Paper |
A differential fault attack on MICKEY 2.0 Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
A chosen IV related key attack on Grain-128a Information Security and Privacy | 2013-06-28 | Paper |
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
A differential fault attack on Grain-128a using macs Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Some results on related key-IV pairs of grain Security, Privacy, and Applied Cryptography Engineering | 2013-03-13 | Paper |
Cryptanalytic results on `Dual CRT' and `Common Prime' RSA Designs, Codes and Cryptography | 2013-01-28 | Paper |
Side channel attack to actual cryptanalysis: breaking CRT-RSA with low weight decryption exponents Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
A differential fault attack on the grain family of stream ciphers Cryptographic Hardware and Embedded Systems – CHES 2012 | 2012-11-13 | Paper |
Proof of empirical RC4 biases and new key correlations Selected Areas in Cryptography | 2012-06-08 | Paper |
scientific article; zbMATH DE number 6006600 (Why is no real title available?) | 2012-02-15 | Paper |
On the evolution of GGHN cipher Lecture Notes in Computer Science | 2011-12-16 | Paper |
A theoretical analysis of the structure of HC-128 Advances in Information and Computer Security | 2011-11-10 | Paper |
Laced Boolean functions and subset sum problems in finite fields Discrete Applied Mathematics | 2011-08-10 | Paper |
Attack on broadcast RC4 revisited Fast Software Encryption | 2011-07-07 | Paper |
Some applications of lattice based root finding techniques Advances in Mathematics of Communications | 2011-06-03 | Paper |
Some observations on HC-128 Designs, Codes and Cryptography | 2011-04-08 | Paper |
One byte per clock: a novel RC4 hardware Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Partial key exposure attack on RSA -- improvements for limited lattice dimensions Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Nega-Hadamard transform, bent and negabent functions Sequences and Their Applications – SETA 2010 | 2010-09-08 | Paper |
Cryptanalysis of RSA with two decryption exponents Information Processing Letters | 2010-09-07 | Paper |
Cryptanalysis of RSA with more than one decryption exponent Information Processing Letters | 2010-09-07 | Paper |
Factoring RSA modulus using prime reconstruction from random known bits Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Efficient CRT-RSA decryption for small encryption exponents Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Further results on implicit factoring in polynomial time Advances in Mathematics of Communications | 2010-03-10 | Paper |
On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2010-01-14 | Paper |
On biases of permutation and keystream bytes of RC4 towards the secret key Cryptography and Communications | 2009-10-26 | Paper |
On affine (non)equivalence of Boolean functions Computing | 2009-08-10 | Paper |
PARTIAL KEY EXPOSURE ATTACKS ON RSA AND ITS VARIANT BY GUESSING A FEW BITS OF ONE OF THE PRIME FACTORS Bulletin of the Korean Mathematical Society | 2009-08-06 | Paper |
A constructive count of rotation symmetric functions Information Processing Letters | 2009-07-09 | Paper |
Efficient search for symmetric Boolean functions under constraints on Walsh spectrum values | 2009-07-06 | Paper |
Results on rotation symmetric bent functions Discrete Mathematics | 2009-06-19 | Paper |
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key Designs, Codes and Cryptography | 2009-03-31 | Paper |
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros Designs, Codes and Cryptography | 2009-03-31 | Paper |
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors Information Security and Cryptology – ICISC 2008 | 2009-03-24 | Paper |
Boolean functions on odd number of variables having nonlinearity greater than the bent concatenation bound | 2009-02-09 | Paper |
A New Class of Weak Encryption Exponents in RSA Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Algebraic immunity for cryptographically significant Boolean functions: analysis and construction IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Search for Boolean Functions With Excellent Profiles in the Rotation Symmetric Class IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Construction of Nonlinear Resilient Boolean Functions Using “Small” Affine Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Reducing the Number of Homogeneous Linear Equations in Finding Annihilators Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
Revisiting Wiener’s Attack – New Weak Keys in RSA Lecture Notes in Computer Science | 2008-11-20 | Paper |
A complete characterization of the evolution of RC4 pseudo random generation algorithm Journal of Mathematical Cryptology | 2008-11-06 | Paper |
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 Fast Software Encryption | 2008-09-18 | Paper |
Rotation symmetric Boolean functions-count and cryptographic properties Discrete Applied Mathematics | 2008-09-10 | Paper |
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck Information Security and Privacy | 2008-07-08 | Paper |
Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic Immunity Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
On Non-randomness of the Permutation After RC4 Key Scheduling Applied Algebra, Algebraic Algorithms and Error-Correcting Codes | 2008-04-17 | Paper |
Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240 Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Permutation After RC4 Key Scheduling Reveals the Secret Key Selected Areas in Cryptography | 2008-03-25 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Balancedness and correlation immunity of symmetric Boolean functions Discrete Mathematics | 2007-09-21 | Paper |
Exact quantum algorithm to distinguish Boolean functions of different weights Journal of Physics A: Mathematical and Theoretical | 2007-08-09 | Paper |
Patterson-Wiedemann Construction Revisited Electronic Notes in Discrete Mathematics | 2007-05-29 | Paper |
Balancedness and Correlation Immunity of Symmetric Boolean Functions Electronic Notes in Discrete Mathematics | 2007-05-29 | Paper |
Rotation Symmetric Boolean Functions –; Count and Cryptographic Properties Electronic Notes in Discrete Mathematics | 2007-05-29 | Paper |
Basic theory in construction of Boolean functions with maximum possible annihilator immunity Designs, Codes and Cryptography | 2006-11-22 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Distributed Computing – IWDC 2005 Lecture Notes in Computer Science | 2006-10-10 | Paper |
Patterson-Wiedemann construction revisited Discrete Mathematics | 2006-08-04 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
A Maiorana--McFarland type construction for resilient Boolean functions on \(n\) variables (\(n\) even) with nonlinearity \(>2^{n-1}-2^{n/2}+2^{n/2-2}\) Discrete Applied Mathematics | 2006-04-28 | Paper |
Construction of nonlinear Boolean functions with important cryptographic properties | 2006-03-01 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Results on multiples of primitive polynomials and their products over GF(2) Theoretical Computer Science | 2005-09-22 | Paper |
Maximum nonlinearity of symmetric Boolean functions on odd number of variables IEEE Transactions on Information Theory | 2005-05-11 | Paper |
Further constructions of resilient Boolean functions with very high nonlinearity IEEE Transactions on Information Theory | 2005-05-11 | Paper |
Linear codes in generalized construction of resilient functions with very high nonlinearity IEEE Transactions on Information Theory | 2005-05-11 | Paper |
scientific article; zbMATH DE number 2085195 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2080672 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 1980963 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1980959 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1955788 (Why is no real title available?) | 2003-07-29 | Paper |
scientific article; zbMATH DE number 1955796 (Why is no real title available?) | 2003-07-29 | Paper |
scientific article; zbMATH DE number 1955797 (Why is no real title available?) | 2003-07-29 | Paper |
scientific article; zbMATH DE number 1951614 (Why is no real title available?) | 2003-07-21 | Paper |
scientific article; zbMATH DE number 1857536 (Why is no real title available?) | 2003-05-19 | Paper |
scientific article; zbMATH DE number 1857523 (Why is no real title available?) | 2003-05-19 | Paper |
scientific article; zbMATH DE number 1857514 (Why is no real title available?) | 2003-05-19 | Paper |
scientific article; zbMATH DE number 1857531 (Why is no real title available?) | 2003-05-19 | Paper |
scientific article; zbMATH DE number 1885950 (Why is no real title available?) | 2003-03-19 | Paper |
scientific article; zbMATH DE number 1878340 (Why is no real title available?) | 2003-03-09 | Paper |
Highly nonlinear balanced Boolean functions with good local and global avalanche characteristics. Information Processing Letters | 2003-01-21 | Paper |
scientific article; zbMATH DE number 1759799 (Why is no real title available?) | 2002-10-07 | Paper |
Modifications of Patterson-Wiedemann functions for cryptographic applications IEEE Transactions on Information Theory | 2002-08-04 | Paper |
Hamming weights of correlation immune Boolean functions Information Processing Letters | 2002-07-25 | Paper |
Cryptographically significant Boolean functions with five valued Walsh spectra Theoretical Computer Science | 2002-07-15 | Paper |
Cross-correlation analysis of cryptographically useful boolean functions and s-boxes Theory of Computing Systems | 2002-05-30 | Paper |
scientific article; zbMATH DE number 1972847 (Why is no real title available?) | 2002-01-01 | Paper |
Highly nonlinear balanced Boolean functions with very good autocorrelation property | 2001-10-15 | Paper |
New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity | 2001-10-14 | Paper |
Ciphertext Only Attack on LFSR Based Encryption Scheme Calcutta Statistical Association Bulletin | 2000-11-14 | Paper |
scientific article; zbMATH DE number 1303957 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1418296 (Why is no real title available?) | 1999-01-01 | Paper |
Almost Perfect Mutually Unbiased Bases that are Sparse | N/A | Paper |