Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. [Citation Graph (, )][DBLP]
Rigorous and Efficient Short Lattice Vectors Enumeration. [Citation Graph (, )][DBLP]
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. [Citation Graph (, )][DBLP]
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. [Citation Graph (, )][DBLP]
An Improved Impossible Differential Attack on MISTY1. [Citation Graph (, )][DBLP]
Generalized Identity Based and Broadcast Encryption Schemes. [Citation Graph (, )][DBLP]
Speeding Up the Pollard Rho Method on Prime Fields. [Citation Graph (, )][DBLP]
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. [Citation Graph (, )][DBLP]
OAEP Is Secure under Key-Dependent Messages. [Citation Graph (, )][DBLP]
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. [Citation Graph (, )][DBLP]