| Publication | Date of Publication | Type |
|---|
| LLLWBC: a new low-latency light-weight block cipher | 2023-08-21 | Paper |
| Post-quantum security on the Lai-Massey scheme | 2023-07-28 | Paper |
| Improved differential attack on round-reduced LEA | 2023-07-26 | Paper |
| Generic construction of Boolean functions with a few Walsh transform values of any possible algebraic degree | 2023-07-07 | Paper |
| Quantum circuit implementations of AES with fewer qubits | 2023-03-21 | Paper |
| Quantum generic attacks on key-alternating Feistel ciphers for shorter keys | 2022-12-05 | Paper |
| New quantum circuit implementations of SM4 and SM3 | 2022-12-05 | Paper |
| Some efficient quantum circuit implementations of Camellia | 2022-11-29 | Paper |
| Transparency order of \((n, m)\)-functions -- its further characterization and applications | 2022-07-13 | Paper |
| Lattice-based fault attacks on deterministic signature schemes of ECDSA and EdDSA | 2022-07-06 | Paper |
| On characterization of transparency order for \((n, m)\)-functions | 2022-07-01 | Paper |
| A new non-random property of 4.5-round PRINCE | 2022-03-24 | Paper |
| Breaking LWC candidates: sESTATE and Elephant in quantum setting | 2021-06-24 | Paper |
| Lattice-Based Fault Attacks Against ECMQV | 2020-07-20 | Paper |
| New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions | 2020-07-02 | Paper |
| Coordination of advertising free riding in hybrid channel supply chain | 2019-02-20 | Paper |
| Security of SM4 against (related-key) differential cryptanalysis | 2018-12-07 | Paper |
| Linear regression attack with F-test: a new SCARE technique for secret block ciphers | 2018-10-26 | Paper |
| Security of online AE schemes in RUP setting | 2018-10-26 | Paper |
| Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE | 2018-05-09 | Paper |
| Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 | 2018-04-10 | Paper |
| Biclique Attack of Block Cipher SKINNY | 2017-05-05 | Paper |
| My Traces Learn What You Did in the Dark: Recovering Secret Signals Without Key Guesses | 2017-04-12 | Paper |
| New criterion for diffusion property and applications to improved GFS and EGFN | 2016-10-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2993214 | 2016-08-10 | Paper |
| Integral Attack Against Bit-Oriented Block Ciphers | 2016-05-19 | Paper |
| Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm | 2016-05-19 | Paper |
| Improved Meet-in-the-Middle Distinguisher on Feistel Schemes | 2016-05-19 | Paper |
| Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure | 2016-05-19 | Paper |
| New Observations on Piccolo Block Cipher | 2016-04-08 | Paper |
| Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE | 2016-01-12 | Paper |
| Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions | 2015-12-04 | Paper |
| LHash: A Lightweight Hash Function | 2015-12-02 | Paper |
| Cryptanalysis of the Round-Reduced GOST Hash Function | 2015-12-02 | Paper |
| The DBlock family of block ciphers | 2015-11-20 | Paper |
| Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes | 2015-11-20 | Paper |
| First Multidimensional Cryptanalysis on Reduced-Round $$\mathrm{PRINCE }_{core}$$ | 2015-10-16 | Paper |
| General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher | 2015-10-16 | Paper |
| Reflection Cryptanalysis of PRINCE-Like Ciphers | 2015-09-18 | Paper |
| Reflection cryptanalysis of PRINCE-like ciphers | 2015-08-03 | Paper |
| Computing Walsh coefficients from the algebraic normal form of a Boolean function | 2014-10-08 | Paper |
| Attacking and Fixing the CS Mode | 2014-09-29 | Paper |
| Differential analysis of the extended generalized Feistel networks | 2014-08-28 | Paper |
| Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE | 2014-07-24 | Paper |
| Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro | 2014-07-07 | Paper |
| Security of the SMS4 block cipher against differential cryptanalysis | 2014-02-06 | Paper |
| Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE | 2013-12-10 | Paper |
| CBCR: CBC MAC with rotating transformations | 2013-07-03 | Paper |
| Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha | 2013-06-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4915020 | 2013-04-16 | Paper |
| 3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound | 2013-03-19 | Paper |
| Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks | 2013-03-19 | Paper |
| (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others | 2013-01-08 | Paper |
| Cryptanalysis of Reduced-Round KLEIN Block Cipher | 2013-01-07 | Paper |
| Preimage Attacks on Step-Reduced SM3 Hash Function | 2012-11-01 | Paper |
| Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers | 2012-09-10 | Paper |
| Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher | 2012-06-29 | Paper |
| TrCBC: another look at CBC-MAC | 2012-05-04 | Paper |
| PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers | 2011-09-16 | Paper |
| Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher | 2011-07-29 | Paper |
| LBlock: A Lightweight Block Cipher | 2011-06-28 | Paper |
| BCBC: A More Efficient MAC Algorithm | 2011-05-19 | Paper |
| Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE | 2010-12-07 | Paper |
| Proposition of Two Cipher Structures | 2010-11-23 | Paper |
| Some results on cryptanalysis of SMS4 block cipher | 2010-09-22 | Paper |
| Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited | 2010-07-13 | Paper |
| Cryptanalysis of the LANE Hash Function | 2009-12-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3640388 | 2009-11-11 | Paper |
| Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia | 2009-11-03 | Paper |
| Security of Truncated MACs | 2009-04-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3610937 | 2009-03-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3611002 | 2009-03-06 | Paper |
| OPMAC: One-Key Poly1305 MAC | 2009-01-15 | Paper |
| Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/ | 2008-12-21 | Paper |
| Improved Impossible Differential Attacks on Large-Block Rijndael | 2008-11-20 | Paper |
| Cryptanalysis of Reduced-Round SMS4 Block Cipher | 2008-07-08 | Paper |
| On the Unprovable Security of 2-Key XCBC | 2008-07-08 | Paper |
| New Results on Impossible Differential Cryptanalysis of Reduced AES | 2008-05-06 | Paper |
| Related-Key Differential-Linear Attacks on Reduced AES-192 | 2008-04-11 | Paper |
| Symmetric Nonce Respecting Security Model and the MEM Mode of Operation | 2008-04-11 | Paper |
| Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192 | 2007-11-29 | Paper |
| Constructing parallel long-message signcryption scheme from trapdoor permutation | 2007-08-31 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Linear cryptanalysis of NUSH block cipher | 2007-02-20 | Paper |
| Collision attack on reduced-round Camellia | 2007-02-20 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Information Security | 2006-10-20 | Paper |
| Pseudorandomness of Camellia-like scheme | 2006-10-12 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5701001 | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4825749 | 2004-11-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945382 | 2000-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3838446 | 1998-10-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4376292 | 1998-02-10 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4376315 | 1997-01-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4869100 | 1996-07-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4300348 | 1995-08-24 | Paper |