Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. [Citation Graph (, )][DBLP]

Rigorous and Efficient Short Lattice Vectors Enumeration. [Citation Graph (, )][DBLP]

Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits. [Citation Graph (, )][DBLP]

An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. [Citation Graph (, )][DBLP]

An Improved Impossible Differential Attack on MISTY1. [Citation Graph (, )][DBLP]

Generalized Identity Based and Broadcast Encryption Schemes. [Citation Graph (, )][DBLP]

Speeding Up the Pollard Rho Method on Prime Fields. [Citation Graph (, )][DBLP]

Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems. [Citation Graph (, )][DBLP]

OAEP Is Secure under Key-Dependent Messages. [Citation Graph (, )][DBLP]

Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. [Citation Graph (, )][DBLP]