| Publication | Date of Publication | Type |
|---|
| Improved differential cryptanalysis on generalized Feistel schemes | 2018-04-26 | Paper |
| Cryptanalysis of Simpira v2 | 2017-08-25 | Paper |
Cryptanalysis of the authenticated encryption algorithm COFFE Lecture Notes in Computer Science | 2016-05-19 | Paper |
Improving the biclique cryptanalysis of AES Information Security and Privacy | 2015-10-20 | Paper |
AEGIS: a fast authenticated encryption algorithm Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Differential-linear cryptanalysis of ICEPOLE Fast Software Encryption | 2015-09-18 | Paper |
Leaked-state-forgery attack against the authenticated encryption algorithm ALE Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Differential attacks against stream cipher ZUC Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Improving the Algorithm 2 in multidimensional linear cryptanalysis Information Security and Privacy | 2011-07-07 | Paper |
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster) Information Security and Privacy | 2011-07-07 | Paper |
Cryptanalysis of the Stream Cipher DECIM Fast Software Encryption | 2009-04-02 | Paper |
Resynchronization Attacks on WG and LEX Fast Software Encryption | 2009-04-02 | Paper |
Differential-Linear Attacks Against the Stream Cipher Phelix Fast Software Encryption | 2008-09-16 | Paper |
| Decentralized robust \(H_\infty\) output feedback controller | 2008-04-04 | Paper |
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Cryptanalysis of the Stream Cipher ABC v2 Selected Areas in Cryptography | 2007-11-29 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
| scientific article; zbMATH DE number 2202215 (Why is no real title available?) | 2005-09-05 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 1980981 (Why is no real title available?) | 2003-09-15 | Paper |
| scientific article; zbMATH DE number 1950339 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1950341 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1808261 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1618048 (Why is no real title available?) | 2002-07-22 | Paper |
| scientific article; zbMATH DE number 1618046 (Why is no real title available?) | 2002-07-16 | Paper |
| scientific article; zbMATH DE number 1302789 (Why is no real title available?) | 2002-06-23 | Paper |
| scientific article; zbMATH DE number 1302790 (Why is no real title available?) | 2002-04-21 | Paper |
| scientific article; zbMATH DE number 1942817 (Why is no real title available?) | 2002-01-01 | Paper |
| scientific article; zbMATH DE number 1612504 (Why is no real title available?) | 2001-07-01 | Paper |
| scientific article; zbMATH DE number 1612518 (Why is no real title available?) | 2001-07-01 | Paper |