| Publication | Date of Publication | Type |
|---|
| https://portal.mardi4nfdi.de/entity/Q6126253 | 2024-04-09 | Paper |
| Practical-time related-key attack on GOST with secret S-boxes | 2024-02-02 | Paper |
| Quantum time/memory/data tradeoff attacks | 2024-01-15 | Paper |
| Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation | 2023-12-08 | Paper |
| Local concentration inequalities and Tomaszewski’s conjecture | 2023-11-14 | Paper |
| Improved covering results for conjugacy classes of symmetric groups via hypercontractivity | 2023-10-27 | Paper |
| Sharp Hypercontractivity for Global Functions | 2023-07-03 | Paper |
| On $t$-Intersecting Families of Permutations | 2023-03-28 | Paper |
| Proof of Tomaszewski's conjecture on randomly signed sums | 2022-08-24 | Paper |
| Practical key recovery attacks on FlexAEAD | 2022-03-31 | Paper |
| Mind the middle layer: the HADES design strategy revisited | 2021-12-08 | Paper |
| Three third generation attacks on the format preserving encryption scheme FF3 | 2021-12-08 | Paper |
| New slide attacks on almost self-similar ciphers | 2021-12-01 | Paper |
| The retracing boomerang attack | 2021-12-01 | Paper |
| The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture | 2021-10-27 | Paper |
| Tight Bounds on Online Checkpointing Algorithms | 2021-07-28 | Paper |
| Tight Bounds on Online Checkpointing Algorithms | 2021-05-03 | Paper |
| A structure theorem for almost low-degree functions on the slice | 2021-01-18 | Paper |
| An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-30 | Paper |
| Improved key recovery attacks on reduced-round AES with practical data and memory complexities | 2020-06-15 | Paper |
| A practical forgery attack on Lilliput-AE | 2020-06-15 | Paper |
| An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-15 | Paper |
| DLCT: a new tool for differential-linear cryptanalysis | 2020-02-04 | Paper |
| Biased halfspaces, noise sensitivity, and local Chernoff inequalities | 2020-01-17 | Paper |
| Stability versions of Erdős-Ko-Rado type theorems via isoperimetry | 2019-12-12 | Paper |
| Efficient dissection of bicomposite problems with cryptanalytic applications | 2019-11-27 | Paper |
| Quantum speedups need structure | 2019-11-09 | Paper |
| A Note on Large H-Intersecting Families | 2019-03-11 | Paper |
| On a biased edge isoperimetric inequality for the discrete cube | 2019-01-25 | Paper |
| On the structure of subsets of the discrete cube with small edge boundary | 2019-01-09 | Paper |
| Improved key recovery attacks on reduced-round AES with practical data and memory complexities | 2018-09-26 | Paper |
| Efficient slide attacks | 2018-09-14 | Paper |
| Approximation of biased Boolean functions of small total influence by DNFs | 2018-08-31 | Paper |
| Chvátal's conjecture and correlation inequalities | 2018-03-02 | Paper |
| The junta method in extremal hypergraph theory and Chvátal's conjecture | 2018-01-18 | Paper |
| Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | 2017-07-12 | Paper |
| Low-Data Complexity Attacks on AES | 2017-06-08 | Paper |
| WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction | 2017-04-12 | Paper |
| A $$2^{70}$$ Attack on the Full MISTY1 | 2016-11-30 | Paper |
| Memory-Efficient Algorithms for Finding Needles in Haystacks | 2016-10-27 | Paper |
| Key recovery attacks on iterated Even-Mansour encryption schemes | 2016-10-13 | Paper |
| On the sum of the \(L_1\) influences of bounded functions | 2016-09-15 | Paper |
| Juntas in theℓ1-grid and Lipschitz maps between discrete tori | 2016-09-15 | Paper |
| On the correlation of increasing families | 2016-08-18 | Paper |
| Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os | 2016-04-20 | Paper |
| New Attacks on Feistel Structures with Improved Memory Complexities | 2015-12-10 | Paper |
| Reflections on slide with a twist attacks | 2015-10-26 | Paper |
| Cryptanalysis of SP Networks with Partial Non-Linear Layers | 2015-09-30 | Paper |
| Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 | 2015-09-18 | Paper |
| Almost universal forgery attacks on AES-based MAC's | 2015-09-01 | Paper |
| Practical-time attacks against reduced variants of~MISTY1 | 2015-09-01 | Paper |
| Improved single-key attacks on 8-round AES-192 and AES-256 | 2015-08-03 | Paper |
| New attacks on IDEA with at least 6 rounds | 2015-05-12 | Paper |
| Slidex attacks on the Even-Mansour encryption scheme | 2015-03-25 | Paper |
| Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys | 2015-01-16 | Paper |
| A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony | 2015-01-07 | Paper |
| Geometric influences. II: Correlation inequalities and noise sensitivity | 2014-12-05 | Paper |
| Quantitative relation between noise sensitivity and influences | 2014-05-05 | Paper |
| Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 | 2013-12-10 | Paper |
| Cryptanalysis of the stream cipher LEX | 2013-05-06 | Paper |
| A note on the entropy/influence conjecture | 2012-10-26 | Paper |
| A tight quantitative version of Arrow's impossibility theorem | 2012-10-19 | Paper |
| Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | 2012-09-25 | Paper |
| A simple reduction from a biased measure on the discrete cube to the uniform measure | 2012-09-12 | Paper |
| Minimalism in Cryptography: The Even-Mansour Scheme Revisited | 2012-06-29 | Paper |
| Geometric influences | 2012-06-19 | Paper |
| A practical attack on KeeLoq | 2012-05-23 | Paper |
| A Quantitative Version of the Gibbard–Satterthwaite Theorem for Three Alternatives | 2011-10-18 | Paper |
| On the Influences of Variables on Boolean Functions in Product Spaces | 2011-01-17 | Paper |
| Improved Single-Key Attacks on 8-Round AES-192 and AES-256 | 2010-12-07 | Paper |
| The effects of the omission of last round's MixColumns on AES | 2010-09-07 | Paper |
| Distinguishing attacks on stream ciphers based on arrays of pseudo-random words | 2010-09-02 | Paper |
| A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | 2010-08-24 | Paper |
| Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds | 2010-06-01 | Paper |
| On the probability of a rational outcome for generalized social welfare functions on three alternatives | 2010-04-21 | Paper |
| Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers | 2010-04-19 | Paper |
| Fast Software Encryption | 2010-01-05 | Paper |
| Fast Software Encryption | 2010-01-05 | Paper |
| Linear transformations of monotone functions on the discrete cube | 2009-12-09 | Paper |
| Lower bound on the correlation between monotone families in the average case | 2009-06-11 | Paper |
| Instant ciphertext-only cryptanalysis of GSM encrypted communication | 2009-06-08 | Paper |
| Cryptanalysis of CTC2 | 2009-04-29 | Paper |
| An Improved Impossible Differential Attack on MISTY1 | 2009-02-10 | Paper |
| A New Attack on the LEX Stream Cipher | 2009-02-10 | Paper |
| New Impossible Differential Attacks on AES | 2009-01-22 | Paper |
| A Differential-Linear Attack on 12-Round Serpent | 2009-01-22 | Paper |
| A New Criterion for Nonlinearity of Block Ciphers | 2008-12-21 | Paper |
| A Unified Approach to Related-Key Attacks | 2008-09-18 | Paper |
| Improved Slide Attacks | 2008-09-16 | Paper |
| A New Attack on 6-Round IDEA | 2008-09-16 | Paper |
| Related-Key Rectangle Attack on 42-Round SHACAL-2 | 2008-06-17 | Paper |
| Related-Key Boomerang and Rectangle Attacks | 2008-05-06 | Paper |
| Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 | 2008-04-24 | Paper |
| New Cryptanalytic Results on IDEA | 2008-04-24 | Paper |
| MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers | 2008-04-17 | Paper |
| A Simple Related-Key Attack on the Full SHACAL-1 | 2008-04-17 | Paper |
| A Practical Attack on KeeLoq | 2008-04-15 | Paper |
| Differential and Rectangle Attacks on Reduced-Round SHACAL-1 | 2008-04-11 | Paper |
| The Delicate Issues of Addition with Respect to XOR Differences | 2008-03-25 | Paper |
| A Related-Key Rectangle Attack on the Full KASUMI | 2008-03-18 | Paper |
| Related-Key Rectangle Attack on the Full SHACAL-1 | 2007-11-29 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Fast Software Encryption | 2006-06-22 | Paper |
| Spectral properties of sign symmetric matrices | 2006-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046332 | 2004-08-12 | Paper |
| Linear Cryptanalysis of Reduced Round Serpent | 2004-08-12 | Paper |
| Enhancing Differential-Linear Cryptanalysis | 2003-07-16 | Paper |
| Positivity of principal minors, sign symmetry and stability. | 2003-05-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2778856 | 2002-03-21 | Paper |