| Publication | Date of Publication | Type |
|---|
Unintended features of APIs: cryptanalysis of incremental HMAC | 2022-03-25 | Paper |
Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack | 2020-07-21 | Paper |
Efficient slide attacks Journal of Cryptology | 2018-09-14 | Paper |
Serpent: a new block cipher proposal Fast Software Encryption | 2018-05-09 | Paper |
A fast new DES implementation in software Fast Software Encryption | 2018-05-09 | Paper |
Cryptanalysis of Ladder-DES Fast Software Encryption | 2018-05-09 | Paper |
Advanced encryption standard. Draft minimum requirements and evaluation criteria Fast Software Encryption | 2018-05-09 | Paper |
Tiger: a fast new hash function Fast Software Encryption | 2017-11-15 | Paper |
Two practical and provably secure block ciphers: BEAR and LION Fast Software Encryption | 2017-11-15 | Paper |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Bug attacks Journal of Cryptology | 2016-10-13 | Paper |
An improvement of linear cryptanalysis with addition operations with applications to FEAL-8X Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
New attacks on IDEA with at least 6 rounds Journal of Cryptology | 2015-05-12 | Paper |
Cryptanalysis of SHA-0 and reduced SHA-1 Journal of Cryptology | 2015-03-25 | Paper |
A proof of the security of quantum key distribution (extended abstract) Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
A practical attack on KeeLoq Journal of Cryptology | 2012-05-23 | Paper |
Techniques for cryptanalysis of block ciphers. (to appear) Information Security and Cryptography | 2012-03-16 | Paper |
Differential-linear cryptanalysis of Serpent. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Rectangle attacks on 49-round SHACAL-1. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Instant ciphertext-only cryptanalysis of GSM encrypted communication Journal of Cryptology | 2009-06-08 | Paper |
Bug Attacks Lecture Notes in Computer Science | 2009-02-10 | Paper |
A Unified Approach to Related-Key Attacks Fast Software Encryption | 2008-09-18 | Paper |
Efficient Reconstruction of RC4 Keys from Internal States Fast Software Encryption | 2008-09-18 | Paper |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru Fast Software Encryption | 2008-09-18 | Paper |
Improved Slide Attacks Fast Software Encryption | 2008-09-16 | Paper |
A New Attack on 6-Round IDEA Fast Software Encryption | 2008-09-16 | Paper |
Collisions of SHA-0 and Reduced SHA-1 Lecture Notes in Computer Science | 2008-05-06 | Paper |
Related-Key Boomerang and Rectangle Attacks Lecture Notes in Computer Science | 2008-05-06 | Paper |
New Cryptanalytic Results on IDEA Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
A Simple Related-Key Attack on the Full SHACAL-1 Lecture Notes in Computer Science | 2008-04-17 | Paper |
A Practical Attack on KeeLoq Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
A Related-Key Rectangle Attack on the Full KASUMI Lecture Notes in Computer Science | 2008-03-18 | Paper |
Basing Weak Public-Key Cryptography on Strong One-Way Functions Theory of Cryptography | 2008-03-05 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Conditional Estimators: An Effective Attack on A5/1 Selected Areas in Cryptography | 2007-11-15 | Paper |
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs Lecture Notes in Computer Science | 2007-09-04 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
A proof of the security of quantum key distribution Journal of Cryptology | 2007-01-24 | Paper |
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials Journal of Cryptology | 2006-08-14 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
scientific article; zbMATH DE number 5009213 (Why is no real title available?) | 2006-03-01 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
scientific article; zbMATH DE number 2089123 (Why is no real title available?) | 2004-08-12 | Paper |
Linear Cryptanalysis of Reduced Round Serpent Fast Software Encryption | 2004-08-12 | Paper |
Differential Cryptanalysis of Q Fast Software Encryption | 2004-08-12 | Paper |
Quantum computing without entanglement Theoretical Computer Science | 2004-08-10 | Paper |
Enhancing Differential-Linear Cryptanalysis Lecture Notes in Computer Science | 2003-07-16 | Paper |
In How Many Ways Can You Write Rijndael? Lecture Notes in Computer Science | 2003-07-16 | Paper |
Security of quantum key distribution against all collective attacks Algorithmica | 2003-05-04 | Paper |
How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. Information Processing Letters | 2003-01-21 | Paper |
Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring Information Processing Letters | 2002-07-25 | Paper |
Cryptanalysis of the ANSI X9. 52 CBCM Mode Journal of Cryptology | 2002-05-21 | Paper |
scientific article; zbMATH DE number 1722685 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1583933 (Why is no real title available?) | 2001-07-08 | Paper |
scientific article; zbMATH DE number 1583936 (Why is no real title available?) | 2001-07-08 | Paper |
On modes of operation Fast Software Encryption | 2000-08-30 | Paper |
Cryptanalysis of triple modes of operation Journal of Cryptology | 2000-06-06 | Paper |
scientific article; zbMATH DE number 1455091 (Why is no real title available?) | 2000-06-05 | Paper |
scientific article; zbMATH DE number 1418249 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1406119 (Why is no real title available?) | 2000-02-23 | Paper |
scientific article; zbMATH DE number 1304130 (Why is no real title available?) | 2000-02-01 | Paper |
scientific article; zbMATH DE number 1394311 (Why is no real title available?) | 2000-01-31 | Paper |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials Advances in Cryptology — EUROCRYPT ’99 | 1999-10-05 | Paper |
scientific article; zbMATH DE number 1303116 (Why is no real title available?) | 1999-06-17 | Paper |
Cryptanalysis of multiple modes of operation Journal of Cryptology | 1998-12-13 | Paper |
scientific article; zbMATH DE number 1088257 (Why is no real title available?) | 1998-05-12 | Paper |
scientific article; zbMATH DE number 1088928 (Why is no real title available?) | 1998-01-26 | Paper |
scientific article; zbMATH DE number 1088943 (Why is no real title available?) | 1997-11-18 | Paper |
scientific article; zbMATH DE number 1024498 (Why is no real title available?) | 1997-11-02 | Paper |
scientific article; zbMATH DE number 1024056 (Why is no real title available?) | 1997-10-06 | Paper |
An improvement of Davies' attack on DES Journal of Cryptology | 1997-08-28 | Paper |
scientific article; zbMATH DE number 1024102 (Why is no real title available?) | 1997-06-18 | Paper |
Differential cryptanalysis of Lucifer Journal of Cryptology | 1996-08-20 | Paper |
scientific article; zbMATH DE number 708826 (Why is no real title available?) | 1995-03-30 | Paper |
New types of cryptanalytic attacks using related keys Journal of Cryptology | 1995-01-30 | Paper |
scientific article; zbMATH DE number 503238 (Why is no real title available?) | 1994-03-07 | Paper |
scientific article; zbMATH DE number 417582 (Why is no real title available?) | 1993-09-19 | Paper |
scientific article; zbMATH DE number 176547 (Why is no real title available?) | 1993-05-18 | Paper |
scientific article; zbMATH DE number 177620 (Why is no real title available?) | 1993-05-18 | Paper |
Differential Cryptanalysis of Feal and N-Hash Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
Differential cryptanalysis of DES-like cryptosystems Journal of Cryptology | 1991-01-01 | Paper |