Publication | Date of Publication | Type |
---|
https://portal.mardi4nfdi.de/entity/Q6126253 | 2024-04-09 | Paper |
Practical-time related-key attack on GOST with secret S-boxes | 2024-02-02 | Paper |
Quantum time/memory/data tradeoff attacks | 2024-01-15 | Paper |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation | 2023-12-08 | Paper |
Local concentration inequalities and Tomaszewski’s conjecture | 2023-11-14 | Paper |
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity | 2023-10-27 | Paper |
Sharp Hypercontractivity for Global Functions | 2023-07-03 | Paper |
On $t$-Intersecting Families of Permutations | 2023-03-28 | Paper |
Proof of Tomaszewski's conjecture on randomly signed sums | 2022-08-24 | Paper |
Practical key recovery attacks on FlexAEAD | 2022-03-31 | Paper |
Mind the middle layer: the HADES design strategy revisited | 2021-12-08 | Paper |
Three third generation attacks on the format preserving encryption scheme FF3 | 2021-12-08 | Paper |
New slide attacks on almost self-similar ciphers | 2021-12-01 | Paper |
The retracing boomerang attack | 2021-12-01 | Paper |
The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture | 2021-10-27 | Paper |
Tight Bounds on Online Checkpointing Algorithms | 2021-07-28 | Paper |
Tight Bounds on Online Checkpointing Algorithms | 2021-05-03 | Paper |
A structure theorem for almost low-degree functions on the slice | 2021-01-18 | Paper |
An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-30 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities | 2020-06-15 | Paper |
A practical forgery attack on Lilliput-AE | 2020-06-15 | Paper |
An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-15 | Paper |
DLCT: a new tool for differential-linear cryptanalysis | 2020-02-04 | Paper |
Biased halfspaces, noise sensitivity, and local Chernoff inequalities | 2020-01-17 | Paper |
Stability versions of Erdős-Ko-Rado type theorems via isoperimetry | 2019-12-12 | Paper |
Efficient dissection of bicomposite problems with cryptanalytic applications | 2019-11-27 | Paper |
Quantum speedups need structure | 2019-11-09 | Paper |
A Note on Large H-Intersecting Families | 2019-03-11 | Paper |
On a biased edge isoperimetric inequality for the discrete cube | 2019-01-25 | Paper |
On the structure of subsets of the discrete cube with small edge boundary | 2019-01-09 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities | 2018-09-26 | Paper |
Efficient slide attacks | 2018-09-14 | Paper |
Approximation of biased Boolean functions of small total influence by DNFs | 2018-08-31 | Paper |
Chvátal's conjecture and correlation inequalities | 2018-03-02 | Paper |
The junta method in extremal hypergraph theory and Chvátal's conjecture | 2018-01-18 | Paper |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | 2017-07-12 | Paper |
Low-Data Complexity Attacks on AES | 2017-06-08 | Paper |
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction | 2017-04-12 | Paper |
A $$2^{70}$$ Attack on the Full MISTY1 | 2016-11-30 | Paper |
Memory-Efficient Algorithms for Finding Needles in Haystacks | 2016-10-27 | Paper |
Key recovery attacks on iterated Even-Mansour encryption schemes | 2016-10-13 | Paper |
On the sum of the \(L_1\) influences of bounded functions | 2016-09-15 | Paper |
Juntas in theℓ1-grid and Lipschitz maps between discrete tori | 2016-09-15 | Paper |
On the correlation of increasing families | 2016-08-18 | Paper |
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os | 2016-04-20 | Paper |
New Attacks on Feistel Structures with Improved Memory Complexities | 2015-12-10 | Paper |
Reflections on slide with a twist attacks | 2015-10-26 | Paper |
Cryptanalysis of SP Networks with Partial Non-Linear Layers | 2015-09-30 | Paper |
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 | 2015-09-18 | Paper |
Almost universal forgery attacks on AES-based MAC's | 2015-09-01 | Paper |
Practical-time attacks against reduced variants of~MISTY1 | 2015-09-01 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 | 2015-08-03 | Paper |
New attacks on IDEA with at least 6 rounds | 2015-05-12 | Paper |
Slidex attacks on the Even-Mansour encryption scheme | 2015-03-25 | Paper |
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys | 2015-01-16 | Paper |
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony | 2015-01-07 | Paper |
Geometric influences. II: Correlation inequalities and noise sensitivity | 2014-12-05 | Paper |
Quantitative relation between noise sensitivity and influences | 2014-05-05 | Paper |
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 | 2013-12-10 | Paper |
Cryptanalysis of the stream cipher LEX | 2013-05-06 | Paper |
A note on the entropy/influence conjecture | 2012-10-26 | Paper |
A tight quantitative version of Arrow's impossibility theorem | 2012-10-19 | Paper |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | 2012-09-25 | Paper |
A simple reduction from a biased measure on the discrete cube to the uniform measure | 2012-09-12 | Paper |
Minimalism in Cryptography: The Even-Mansour Scheme Revisited | 2012-06-29 | Paper |
Geometric influences | 2012-06-19 | Paper |
A practical attack on KeeLoq | 2012-05-23 | Paper |
A Quantitative Version of the Gibbard–Satterthwaite Theorem for Three Alternatives | 2011-10-18 | Paper |
On the Influences of Variables on Boolean Functions in Product Spaces | 2011-01-17 | Paper |
Improved Single-Key Attacks on 8-Round AES-192 and AES-256 | 2010-12-07 | Paper |
The effects of the omission of last round's MixColumns on AES | 2010-09-07 | Paper |
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words | 2010-09-02 | Paper |
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | 2010-08-24 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds | 2010-06-01 | Paper |
On the probability of a rational outcome for generalized social welfare functions on three alternatives | 2010-04-21 | Paper |
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers | 2010-04-19 | Paper |
Fast Software Encryption | 2010-01-05 | Paper |
Fast Software Encryption | 2010-01-05 | Paper |
Linear transformations of monotone functions on the discrete cube | 2009-12-09 | Paper |
Lower bound on the correlation between monotone families in the average case | 2009-06-11 | Paper |
Instant ciphertext-only cryptanalysis of GSM encrypted communication | 2009-06-08 | Paper |
Cryptanalysis of CTC2 | 2009-04-29 | Paper |
An Improved Impossible Differential Attack on MISTY1 | 2009-02-10 | Paper |
A New Attack on the LEX Stream Cipher | 2009-02-10 | Paper |
New Impossible Differential Attacks on AES | 2009-01-22 | Paper |
A Differential-Linear Attack on 12-Round Serpent | 2009-01-22 | Paper |
A New Criterion for Nonlinearity of Block Ciphers | 2008-12-21 | Paper |
A Unified Approach to Related-Key Attacks | 2008-09-18 | Paper |
Improved Slide Attacks | 2008-09-16 | Paper |
A New Attack on 6-Round IDEA | 2008-09-16 | Paper |
Related-Key Rectangle Attack on 42-Round SHACAL-2 | 2008-06-17 | Paper |
Related-Key Boomerang and Rectangle Attacks | 2008-05-06 | Paper |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 | 2008-04-24 | Paper |
New Cryptanalytic Results on IDEA | 2008-04-24 | Paper |
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers | 2008-04-17 | Paper |
A Simple Related-Key Attack on the Full SHACAL-1 | 2008-04-17 | Paper |
A Practical Attack on KeeLoq | 2008-04-15 | Paper |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1 | 2008-04-11 | Paper |
The Delicate Issues of Addition with Respect to XOR Differences | 2008-03-25 | Paper |
A Related-Key Rectangle Attack on the Full KASUMI | 2008-03-18 | Paper |
Related-Key Rectangle Attack on the Full SHACAL-1 | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
Spectral properties of sign symmetric matrices | 2006-05-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q3046332 | 2004-08-12 | Paper |
Linear Cryptanalysis of Reduced Round Serpent | 2004-08-12 | Paper |
Enhancing Differential-Linear Cryptanalysis | 2003-07-16 | Paper |
Positivity of principal minors, sign symmetry and stability. | 2003-05-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778856 | 2002-03-21 | Paper |
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os | 0001-01-03 | Paper |
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR | 0001-01-03 | Paper |