| Publication | Date of Publication | Type |
|---|
Key recovery attacks on grain-like keystream generators with key injection | 2024-01-11 | Paper |
Algebraic attacks on grain-like keystream generators | 2022-12-07 | Paper |
Differential random fault attacks on certain CAESAR stream ciphers | 2020-07-08 | Paper |
A fundamental flaw in the ++AE authenticated encryption mode Journal of Mathematical Cryptology | 2018-04-10 | Paper |
Fault attacks on XEX mode with application to certain authenticated encryption modes | 2017-08-25 | Paper |
Fast correlation attacks on nonlinear filter generators Information Processing Letters | 2016-05-26 | Paper |
Flaws in the initialisation process of stream ciphers Computation, Cryptography, and Network Security | 2016-03-04 | Paper |
Weaknesses in the initialisation process of the common scrambling algorithm stream cipher Sequences and Their Applications - SETA 2014 | 2015-09-09 | Paper |
Indirect message injection for MAC generation Journal of Mathematical Cryptology | 2013-11-12 | Paper |
State cycles, initialization and the Trivium stream cipher Cryptography and Communications | 2013-06-24 | Paper |
A general model for MAC generation using direct injection Information Security and Cryptology | 2013-05-28 | Paper |
Analysis of indirect message injection for MAC generation using stream ciphers Information Security and Privacy | 2012-09-07 | Paper |
A framework for security analysis of key derivation functions Information Security Practice and Experience | 2012-06-29 | Paper |
State convergence in the initialisation of stream ciphers Information Security and Privacy | 2011-07-07 | Paper |
Linearity within the SMS4 block cipher Information Security and Cryptology | 2010-11-23 | Paper |
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher Information Security and Privacy | 2009-06-25 | Paper |
scientific article; zbMATH DE number 5531983 (Why is no real title available?) | 2009-03-24 | Paper |
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks Information Security and Privacy | 2009-03-06 | Paper |
Improved Cryptanalysis of MAG Information Security and Privacy | 2007-09-07 | Paper |
scientific article; zbMATH DE number 1996484 (Why is no real title available?) | 2003-10-22 | Paper |
scientific article; zbMATH DE number 1500493 (Why is no real title available?) | 2002-08-14 | Paper |
scientific article; zbMATH DE number 1522640 (Why is no real title available?) | 2002-06-10 | Paper |
scientific article; zbMATH DE number 1744098 (Why is no real title available?) | 2002-05-22 | Paper |
scientific article; zbMATH DE number 1689010 (Why is no real title available?) | 2002-01-09 | Paper |
scientific article; zbMATH DE number 1588475 (Why is no real title available?) | 2001-07-17 | Paper |
scientific article; zbMATH DE number 1304126 (Why is no real title available?) | 2000-02-02 | Paper |
scientific article; zbMATH DE number 1189377 (Why is no real title available?) | 1998-10-08 | Paper |