| Publication | Date of Publication | Type |
|---|
Polynomial time cryptanalytic extraction of neural network models | 2024-11-13 | Paper |
The retracing boomerang attack, with application to reduced-round AES Journal of Cryptology | 2024-08-30 | Paper |
Quantum time/memory/data tradeoff attacks Designs, Codes and Cryptography | 2024-01-15 | Paper |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
scientific article; zbMATH DE number 7526293 (Why is no real title available?) | 2022-05-12 | Paper |
scientific article; zbMATH DE number 7526294 (Why is no real title available?) | 2022-05-12 | Paper |
Three third generation attacks on the format preserving encryption scheme FF3 | 2021-12-08 | Paper |
New slide attacks on almost self-similar ciphers | 2021-12-01 | Paper |
The retracing boomerang attack | 2021-12-01 | Paper |
Tight bounds on online checkpointing algorithms | 2021-07-28 | Paper |
Tight Bounds on Online Checkpointing Algorithms ACM Transactions on Algorithms | 2021-05-03 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities Journal of Cryptology | 2020-06-15 | Paper |
Efficient dissection of bicomposite problems with cryptanalytic applications Journal of Cryptology | 2019-11-27 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities Lecture Notes in Computer Science | 2018-09-26 | Paper |
Remote Password Extraction from RFID Tags IEEE Transactions on Computers | 2018-06-12 | Paper |
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs Algorithmica | 2018-01-05 | Paper |
Comparative Power Analysis of Modular Exponentiation Algorithms IEEE Transactions on Computers | 2017-07-27 | Paper |
Acoustic cryptanalysis Journal of Cryptology | 2017-05-22 | Paper |
Identity-based cryptosystems and signature schemes Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2017-04-10 | Paper |
Memory-Efficient Algorithms for Finding Needles in Haystacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Key recovery attacks on iterated Even-Mansour encryption schemes Journal of Cryptology | 2016-10-13 | Paper |
New second-preimage attacks on hash functions Journal of Cryptology | 2016-10-13 | Paper |
Bug attacks Journal of Cryptology | 2016-10-13 | Paper |
New attacks on Feistel structures with improved memory complexities Lecture Notes in Computer Science | 2015-12-10 | Paper |
Reflections on slide with a twist attacks Designs, Codes and Cryptography | 2015-10-26 | Paper |
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials Fast Software Encryption | 2015-09-18 | Paper |
Improved linear sieving techniques with applications to step-reduced LED-64 Fast Software Encryption | 2015-09-18 | Paper |
Improved top-down techniques in differential cryptanalysis Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Using random error correcting codes in near-collision attacks on generic hash-functions Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Almost universal forgery attacks on AES-based MAC's Designs, Codes and Cryptography | 2015-09-01 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 Journal of Cryptology | 2015-08-03 | Paper |
New attacks on IDEA with at least 6 rounds Journal of Cryptology | 2015-05-12 | Paper |
On the generation of multivariate polynomials which are hard to factor Proceedings of the twenty-fifth annual ACM symposium on Theory of computing - STOC '93 | 2015-05-07 | Paper |
Slidex attacks on the Even-Mansour encryption scheme Journal of Cryptology | 2015-03-25 | Paper |
Cryptanalysis of iterated Even-Mansour schemes with two keys Lecture Notes in Computer Science | 2015-01-16 | Paper |
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony Journal of Cryptology | 2015-01-07 | Paper |
Improved practical attacks on round-reduced Keccak Journal of Cryptology | 2014-09-25 | Paper |
How to eat your entropy and have it too -- optimal recovery strategies for compromised RNGs Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
RSA key extraction via low-bandwidth acoustic cryptanalysis Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Applying cube attacks to stream ciphers in realistic scenarios Cryptography and Communications | 2013-06-24 | Paper |
New attacks on Keccak-224 and Keccak-256 Fast Software Encryption | 2013-01-08 | Paper |
Improved Attacks on Full GOST Fast Software Encryption | 2013-01-08 | Paper |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Lecture Notes in Computer Science | 2012-09-25 | Paper |
Minimalism in cryptography: the Even-Mansour scheme revisited Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware Lecture Notes in Computer Science | 2011-12-02 | Paper |
An improved algebraic attack on Hamsi-256 Fast Software Encryption | 2011-07-07 | Paper |
Breaking Grain-128 with dynamic cube attacks Fast Software Encryption | 2011-07-07 | Paper |
RFID authentication efficient proactive information security within computational security Theory of Computing Systems | 2011-04-01 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Structural cryptanalysis of SASAS Journal of Cryptology | 2010-11-12 | Paper |
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Fast exhaustive search for polynomial systems in \({\mathbb{F}_2}\) Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Efficient cache attacks on AES, and countermeasures Journal of Cryptology | 2010-03-01 | Paper |
Factoring estimates for a 1024-bit RSA modulus Lecture Notes in Computer Science | 2010-01-05 | Paper |
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium Fast Software Encryption | 2009-08-11 | Paper |
Cube Attacks on Tweakable Black Box Polynomials Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions Fast Software Encryption | 2009-04-02 | Paper |
Improved Related-key Attacks on DESX and DESX+ Cryptologia | 2009-03-23 | Paper |
Practical Cryptanalysis of SFLASH Advances in Cryptology - CRYPTO 2007 | 2009-03-10 | Paper |
Bug Attacks Lecture Notes in Computer Science | 2009-02-10 | Paper |
SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags Fast Software Encryption | 2008-09-18 | Paper |
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak Automata, Languages and Programming | 2008-08-19 | Paper |
Second Preimage Attacks on Dithered Hash Functions Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Length-based cryptanalysis: the case of Thompson's group Journal of Mathematical Cryptology | 2008-02-21 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs Lecture Notes in Computer Science | 2007-09-04 | Paper |
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials Journal of Cryptology | 2006-08-14 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Efficient algorithms for solving overdefined systems of multivariate polynomial equations | 2006-03-01 | Paper |
Analysis and optimization of the twinkle factoring device | 2006-03-01 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Stream Ciphers: Dead or Alive? | 2005-08-12 | Paper |
scientific article; zbMATH DE number 2102677 (Why is no real title available?) | 2004-09-24 | Paper |
scientific article; zbMATH DE number 2088326 (Why is no real title available?) | 2004-08-12 | Paper |
A Practical Attack on Broadcast RC4 Fast Software Encryption | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2085191 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2081086 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 1979303 (Why is no real title available?) | 2003-09-11 | Paper |
scientific article; zbMATH DE number 1962160 (Why is no real title available?) | 2003-08-10 | Paper |
Analysis of Neural Cryptography Lecture Notes in Computer Science | 2003-07-16 | Paper |
Analysis of Bernstein’s Factorization Circuit Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1942412 (Why is no real title available?) | 2003-06-30 | Paper |
scientific article; zbMATH DE number 1878330 (Why is no real title available?) | 2003-03-09 | Paper |
Guaranteeing the diversity of number generators Information and Computation | 2003-01-14 | Paper |
scientific article; zbMATH DE number 1842501 (Why is no real title available?) | 2002-12-08 | Paper |
scientific article; zbMATH DE number 1759283 (Why is no real title available?) | 2002-11-28 | Paper |
scientific article; zbMATH DE number 1759258 (Why is no real title available?) | 2002-10-13 | Paper |
scientific article; zbMATH DE number 1408377 (Why is no real title available?) | 2002-05-05 | Paper |
scientific article; zbMATH DE number 1722688 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1583765 (Why is no real title available?) | 2001-07-03 | Paper |
scientific article; zbMATH DE number 1418284 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1418249 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1304130 (Why is no real title available?) | 2000-02-01 | Paper |
scientific article; zbMATH DE number 1303123 (Why is no real title available?) | 2000-01-10 | Paper |
Multiple NonInteractive Zero Knowledge Proofs Under General Assumptions SIAM Journal on Computing | 1999-10-28 | Paper |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials Advances in Cryptology — EUROCRYPT ’99 | 1999-10-05 | Paper |
scientific article; zbMATH DE number 1341875 (Why is no real title available?) | 1999-09-22 | Paper |
scientific article; zbMATH DE number 1302851 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1504795 (Why is no real title available?) | 1999-01-01 | Paper |
scientific article; zbMATH DE number 1088257 (Why is no real title available?) | 1998-05-12 | Paper |
Fully parallelized multi-prover protocols for NEXP-time Journal of Computer and System Sciences | 1997-12-08 | Paper |
scientific article; zbMATH DE number 1088940 (Why is no real title available?) | 1997-11-18 | Paper |
scientific article; zbMATH DE number 1088898 (Why is no real title available?) | 1997-11-18 | Paper |
scientific article; zbMATH DE number 1024040 (Why is no real title available?) | 1997-06-18 | Paper |
A one-round, two-prover, zero-knowledge protocol for NP Combinatorica | 1996-04-10 | Paper |
scientific article; zbMATH DE number 708826 (Why is no real title available?) | 1995-03-30 | Paper |
Publicly Verifiable Non-Interactive Zero-Knowledge Proofs Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings | 1994-09-20 | Paper |
IP = PSPACE Journal of the ACM | 1994-08-21 | Paper |
scientific article; zbMATH DE number 503265 (Why is no real title available?) | 1994-05-16 | Paper |
scientific article; zbMATH DE number 503238 (Why is no real title available?) | 1994-03-07 | Paper |
Universal tests for nonuniform distributions Journal of Cryptology | 1994-02-21 | Paper |
scientific article; zbMATH DE number 417582 (Why is no real title available?) | 1993-09-19 | Paper |
On dice and coins: Models of computation for random generation Information and Computation | 1993-08-30 | Paper |
Differential Cryptanalysis of Feal and N-Hash Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
scientific article; zbMATH DE number 176551 (Why is no real title available?) | 1993-05-18 | Paper |
scientific article; zbMATH DE number 176547 (Why is no real title available?) | 1993-05-18 | Paper |
Multi-oracle interactive protocols with constant space verifiers Journal of Computer and System Sciences | 1992-09-27 | Paper |
scientific article; zbMATH DE number 4191107 (Why is no real title available?) | 1991-01-01 | Paper |
Differential cryptanalysis of DES-like cryptosystems Journal of Cryptology | 1991-01-01 | Paper |
scientific article; zbMATH DE number 4191106 (Why is no real title available?) | 1990-01-01 | Paper |
scientific article; zbMATH DE number 4117876 (Why is no real title available?) | 1989-01-01 | Paper |
How to find a battleship Networks | 1989-01-01 | Paper |
Zero-knowledge proofs of identity Journal of Cryptology | 1988-01-01 | Paper |
Reconstructing Truncated Integer Variables Satisfying Linear Congruences SIAM Journal on Computing | 1988-01-01 | Paper |
scientific article; zbMATH DE number 4123668 (Why is no real title available?) | 1987-01-01 | Paper |
How To Prove Yourself: Practical Solutions to Identification and Signature Problems Advances in Cryptology — CRYPTO’ 86 | 1987-01-01 | Paper |
Efficient Factoring Based on Partial Information Advances in Cryptology — EUROCRYPT’ 85 | 1986-01-01 | Paper |
Polymorphic arrays: A novel VLSI layout for systolic computers Journal of Computer and System Sciences | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3963720 (Why is no real title available?) | 1986-01-01 | Paper |
Number-theoretic functions which are equivalent to number of divisors Information Processing Letters | 1985-01-01 | Paper |
Generalized 'write-once' memories IEEE Transactions on Information Theory | 1984-01-01 | Paper |
A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem IEEE Transactions on Information Theory | 1984-01-01 | Paper |
scientific article; zbMATH DE number 3865148 (Why is no real title available?) | 1983-01-01 | Paper |
Embedding cryptographic trapdoors in arbitrary knapsack systems Information Processing Letters | 1983-01-01 | Paper |
How to reuse a “write-once≓ memory Information and Control | 1982-01-01 | Paper |
A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems SIAM Journal on Computing | 1981-01-01 | Paper |
scientific article; zbMATH DE number 3724342 (Why is no real title available?) | 1981-01-01 | Paper |
On the power of commutativity in cryptography Automata, Languages and Programming | 1980-01-01 | Paper |
On the security of the Merkle- Hellman cryptographic scheme (Corresp.) IEEE Transactions on Information Theory | 1980-01-01 | Paper |
How to share a secret Communications of the ACM | 1979-01-01 | Paper |
A Linear Time Algorithm for Finding Minimum Cutsets in Reducible Graphs SIAM Journal on Computing | 1979-01-01 | Paper |
Factoring numbers in O(log n) arithmetic steps Information Processing Letters | 1979-01-01 | Paper |
A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM | 1978-01-01 | Paper |
The convergence of functions to fixedpoints of recursive definitions Theoretical Computer Science | 1978-01-01 | Paper |
The optimal approach to recursive programs Communications of the ACM | 1977-01-01 | Paper |
scientific article; zbMATH DE number 3550165 (Why is no real title available?) | 1977-01-01 | Paper |
scientific article; zbMATH DE number 3657802 (Why is no real title available?) | 1976-01-01 | Paper |
On the Complexity of Timetable and Multicommodity Flow Problems SIAM Journal on Computing | 1976-01-01 | Paper |
The Theoretical Aspects of the Optimal Fixedpoint SIAM Journal on Computing | 1976-01-01 | Paper |
scientific article; zbMATH DE number 3569796 (Why is no real title available?) | 1975-01-01 | Paper |