| Publication | Date of Publication | Type |
|---|
| Compact lattice gadget and its applications to hash-and-sign signatures | 2024-02-06 | Paper |
| Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks | 2024-02-02 | Paper |
| Lattice-based cryptography: a survey | 2024-01-04 | Paper |
| Meet-in-the-middle preimage attacks on sponge-based hashing | 2023-12-08 | Paper |
| Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} | 2023-08-25 | Paper |
| Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials | 2023-05-12 | Paper |
| Preimage attacks on 4-round Keccak by solving multivariate quadratic systems | 2022-12-07 | Paper |
| Differential-algebraic cryptanalysis of reduced-round of Serpent-256 | 2022-10-28 | Paper |
| On an attack on RSA with small CRT-exponents | 2022-10-28 | Paper |
| Key guessing strategies for linear key-schedule algorithms in rectangle attacks | 2022-08-30 | Paper |
| Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks | 2022-04-22 | Paper |
| Computational aspects of lattices and their cryptographic applications | 2022-03-21 | Paper |
| Automatic search of meet-in-the-middle preimage attacks on AES-like hashing | 2021-12-08 | Paper |
| Quantum attacks on some Feistel block ciphers | 2020-05-21 | Paper |
| MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes | 2019-05-24 | Paper |
| A key-recovery attack on 855-round Trivium | 2018-09-26 | Paper |
| Conditional cube attack on round-reduced River Keyak | 2018-05-24 | Paper |
| Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques | 2018-05-09 | Paper |
| Improved conditional cube attacks on Keccak keyed modes with MILP method | 2018-04-06 | Paper |
| Provably Secure NTRU Instances over Prime Cyclotomic Rings | 2017-06-13 | Paper |
| Conditional Cube Attack on Reduced-Round Keccak Sponge Function | 2017-06-13 | Paper |
| Cryptanalysis of a Homomorphic Encryption Scheme Over Integers | 2017-05-05 | Paper |
| Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques | 2016-09-02 | Paper |
| Improved Impossible Differential Attack on Reduced-Round LBlock | 2016-05-19 | Paper |
| Improved Attacks on Reduced-Round Camellia-128/192/256 | 2016-03-02 | Paper |
| Finding Shortest Lattice Vectors in the Presence of Gaps | 2016-03-02 | Paper |
| Improved Cryptanalysis of the Block Cipher KASUMI | 2015-12-04 | Paper |
| The Boomerang Attacks on the Round-Reduced Skein-512 | 2015-12-04 | Paper |
| Mathematical Foundations of Public Key Cryptography | 2015-10-07 | Paper |
| Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 | 2015-09-18 | Paper |
| Improved Single-Key Attacks on 9-Round AES-192/256 | 2015-09-18 | Paper |
| Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia | 2015-09-18 | Paper |
| A note on BDD problems with \(\lambda_2\)-gap | 2015-06-25 | Paper |
| Cryptanalysis of GOST R hash function | 2014-08-28 | Paper |
| Fast correlation attack on stream cipher ABC v3 | 2014-07-21 | Paper |
| Improved Boomerang Attacks on SM3 | 2013-06-28 | Paper |
| New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia | 2013-01-08 | Paper |
| Public key encryption without random oracle made truly practical | 2012-10-19 | Paper |
| On the equivalent keys in multivariate cryptosystems | 2012-10-05 | Paper |
| Public Key Encryption for the Forgetful | 2012-06-08 | Paper |
| Practical Attack on the Full MMB Block Cipher | 2012-06-08 | Paper |
| On the correlation of pseudorandom binary sequences using additive characters | 2011-12-20 | Paper |
| Pseudo-Cryptanalysis of Luffa | 2011-07-29 | Paper |
| New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 | 2011-07-07 | Paper |
| Cryptanalysis of the Compression Function of SIMD | 2011-07-07 | Paper |
| Certificateless encryption scheme secure in standard model | 2010-11-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3653719 | 2009-12-28 | Paper |
| Large families of elliptic curve pseudorandom binary sequences | 2009-12-08 | Paper |
| New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 | 2009-11-03 | Paper |
| New Birthday Attacks on Some MACs Based on Block Ciphers | 2009-10-20 | Paper |
| New Distinguishing Attack on MAC Using Secret-Prefix Method | 2009-08-11 | Paper |
| Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 | 2009-06-25 | Paper |
| Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC | 2009-05-12 | Paper |
| Cryptanalysis of the Full HAVAL with 4 and 5 Passes | 2009-04-02 | Paper |
| Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL | 2008-05-06 | Paper |
| Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 | 2008-05-06 | Paper |
| Cryptanalysis of the Hash Functions MD4 and RIPEMD | 2008-05-06 | Paper |
| How to Break MD5 and Other Hash Functions | 2008-05-06 | Paper |
| Efficient Collision Search Attacks on SHA-0 | 2008-03-17 | Paper |
| Finding Collisions in the Full SHA-1 | 2008-03-17 | Paper |
| An attack on hash function HAVAL-128 | 2007-02-20 | Paper |
| Cryptology and Network Security | 2006-11-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4950043 | 2001-10-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4025542 | 1993-02-18 | Paper |