| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Quantum Inf. Process.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | — | conf |
ECOC
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Entropy
|
| 2024 | J | jnl |
CoRR
|
| 2024 | — | conf |
OFC
|
| 2024 | J | jnl |
Quantum Inf. Process.
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
Quantum Inf. Comput.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | C | conf |
IH&MMSec
|
| 2022 | J | jnl |
CoRR
|
| 2022 | — | conf |
WPES@CCS
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
Quantum Inf. Comput.
|
| 2021 | J | jnl |
Quantum Inf. Comput.
|
| 2021 | J | jnl |
Quantum Inf. Comput.
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
SIGMOD Conference
|
| 2020 | — | conf |
WPES@CCS
|
| 2020 | A* | conf |
NDSS
|
| 2020 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2020 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
IEEE Trans. Dependable Secur. Comput.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
EURASIP J. Inf. Secur.
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2019 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2019 | J | jnl |
Quantum Inf. Comput.
|
| 2019 | — | conf |
WIFS
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
J. Cryptogr. Eng.
|
| 2018 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2018 | J | jnl |
CoRR
|
| 2018 | J | jnl |
Quantum Inf. Process.
|
| 2018 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2018 | J | jnl |
Quantum Inf. Process.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
Quantum Inf. Process.
|
| 2017 | — | conf |
WIFS
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2017 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2017 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
Int. J. Inf. Sec.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
EURASIP J. Adv. Signal Process.
|
| 2016 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2016 | J | jnl |
Quantum Inf. Comput.
|
| 2015 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2015 | J | jnl |
Des. Codes Cryptogr.
|
| 2015 | J | jnl |
Des. Codes Cryptogr.
|
| 2015 | J | jnl |
Des. Codes Cryptogr.
|
| 2015 | — | conf |
WIFS
|
| 2015 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2015 | — | conf |
TrustED@CCS
|
| 2015 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2014 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
TrustED@CCS
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | C | conf |
SECRYPT
|
| 2013 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | C | conf |
IH&MMSec
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2013 | — | conf |
WIFS
|
| 2012 | J | jnl |
Des. Codes Cryptogr.
|
| 2012 | — | conf |
Information Hiding
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | A | conf |
ESORICS
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2012 | J | jnl |
Int. J. Inf. Technol. Decis. Mak.
|
| 2012 | J | jnl |
CoRR
|
| 2012 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2011 | — | conf |
Information Hiding
|
| 2011 | J | jnl |
CoRR
|
| 2011 | — | conf |
Information Hiding
|
| 2011 | J | jnl |
CoRR
|
| 2011 | J | jnl |
CoRR
|
| 2011 | J | jnl |
Inf. Comput.
|
| 2011 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2010 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2010 | J | jnl |
Int. J. Inf. Sec.
|
| 2010 | J | jnl |
IEEE Trans. Inf. Forensics Secur.
|
| 2010 | — | conf |
AFRICACRYPT
|
| 2010 | — | conf |
Information Hiding
|
| 2009 | — | conf |
Foundations for Forgery-Resilient Cryptographic Hardware
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
Inf. Syst. Frontiers
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | — | conf |
HOST
|
| 2009 | — | conf |
Foundations for Forgery-Resilient Cryptographic Hardware
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | — | conf |
WIFS
|
| 2009 | — | conf |
Public Key Cryptography
|
| 2008 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2008 | J | jnl |
CoRR
|
| 2008 | J | jnl |
Des. Codes Cryptogr.
|
| 2008 | J | jnl |
IEEE Trans. Inf. Theory
|
| 2007 | — | conf |
ESAS
|
| 2007 | — | conf |
Information Hiding
|
| 2007 | — | ch. |
Security, Privacy, and Trust in Modern Data Management
|
| 2007 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2007 | J | jnl |
CoRR
|
| 2006 | B | conf |
Estimating the Secrecy-Rate of Physical Unclonable Functions with the Context-Tree Weighting Method.
ISIT
|
| 2006 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2006 | A | conf |
AsiaCCS
|
| 2006 | — | conf |
ISSE
|
| 2006 | A | conf |
CHES
|
| 2006 | J | jnl |
CoRR
|
| 2006 | A | conf |
ESORICS
|
| 2005 | — | conf |
Financial Cryptography
|
| 2005 | B | conf |
ACNS
|
| 2004 | B | conf |
ISIT
|