| Publication | Date of Publication | Type |
|---|
| Can a differential attack work for an arbitrarily large number of rounds? | 2022-03-24 | Paper |
| Systematic construction of nonlinear product attacks on block ciphers | 2020-07-08 | Paper |
| Invariant Hopping Attacks on Block Ciphers | 2020-02-08 | Paper |
How many weak-keys exist in T-310? Tatra Mountains Mathematical Publications | 2019-09-30 | Paper |
| Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher | 2019-02-07 | Paper |
| Two philosophies for solving non-linear equations in algebraic cryptanalysis | 2017-10-23 | Paper |
On optimal size in truncated differential attacks Studia Scientiarum Mathematicarum Hungarica | 2017-03-31 | Paper |
Speed optimizations in bitcoin key recovery attacks Tatra Mountains Mathematical Publications | 2017-03-29 | Paper |
An improved differential attack on full GOST The New Codebreakers | 2016-05-02 | Paper |
Advanced truncated differential attacks against GOST block cipher and its variants Computation, Cryptography, and Network Security | 2016-03-04 | Paper |
Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers Tatra Mountains Mathematical Publications | 2016-02-24 | Paper |
Cryptanalysis of GOST in the multiple-key scenario Tatra Mountains Mathematical Publications | 2014-03-14 | Paper |
Aggregated differentials and cryptanalysis of PP-1 and GOST Periodica Mathematica Hungarica | 2013-08-06 | Paper |
Contradiction immunity and guess-then-determine attacks on GOST Tatra Mountains Mathematical Publications | 2013-02-11 | Paper |
ElimLin algorithm revisited Fast Software Encryption | 2013-01-08 | Paper |
Self-similarity attacks on block ciphers and application to KeeLoq Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Random permutation statistics and an improved slide-determine attack on KeeLoq Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Algebraic, AIDA/Cube and side channel analysis of KATAN family of block ciphers Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Practical Algebraic Attacks on the Hitag2 Stream Cipher Lecture Notes in Computer Science | 2009-09-29 | Paper |
| Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers | 2009-05-22 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts Research in Cryptology | 2009-01-22 | Paper |
Algebraic and Slide Attacks on KeeLoq Fast Software Encryption | 2008-09-18 | Paper |
Algebraic Attacks on Combiners with Memory and Several Outputs Lecture Notes in Computer Science | 2008-03-17 | Paper |
Algebraic Cryptanalysis of the Data Encryption Standard Cryptography and Coding | 2008-03-07 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
On Exact Algebraic [Non-Immunity of S-Boxes Based on Power Functions] Information Security and Privacy | 2007-09-07 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
| Efficient algorithms for solving overdefined systems of multivariate polynomial equations | 2006-03-01 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
| scientific article; zbMATH DE number 2085432 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2081064 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2081078 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2009966 (Why is no real title available?) | 2003-11-26 | Paper |
| scientific article; zbMATH DE number 1962148 (Why is no real title available?) | 2003-08-10 | Paper |
A Fast and Secure Implementation of Sflash Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
On the Security of HFE, HFEv- and Quartz Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
Generic Attacks and the Security of Quartz Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
| scientific article; zbMATH DE number 1950612 (Why is no real title available?) | 2003-07-17 | Paper |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1617932 (Why is no real title available?) | 2002-09-01 | Paper |
| scientific article; zbMATH DE number 1617934 (Why is no real title available?) | 2001-11-18 | Paper |
| scientific article; zbMATH DE number 1617933 (Why is no real title available?) | 2001-07-12 | Paper |
| scientific article; zbMATH DE number 1583768 (Why is no real title available?) | 2001-07-03 | Paper |
| scientific article; zbMATH DE number 1302783 (Why is no real title available?) | 1999-10-06 | Paper |
| scientific article; zbMATH DE number 1303122 (Why is no real title available?) | 1999-09-06 | Paper |