| Publication | Date of Publication | Type |
|---|
| Bidirectional Asynchronous Ratcheted Key Agreement with Linear Complexity | 2024-03-14 | Paper |
| On active attack detection in messaging with immediate decryption | 2024-02-06 | Paper |
| Anonymous tokens with stronger metadata bit hiding from algebraic MACs | 2024-02-02 | Paper |
| A gapless post-quantum hash proof system in the Hamming metric | 2023-11-09 | Paper |
| Post-Compromise Security in Self-Encryption | 2023-07-03 | Paper |
| Solving the learning parity with noise problem using quantum algorithms | 2023-06-02 | Paper |
| New attacks on LowMC instances with a single plaintext/ciphertext pair | 2023-05-12 | Paper |
| FAST: secure and high performance format-preserving encryption and tokenization | 2023-05-12 | Paper |
| Determining the core primitive for optimally secure ratcheting | 2023-03-29 | Paper |
| Towards witness encryption without multilinear maps | 2022-12-07 | Paper |
| On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 | 2022-08-30 | Paper |
| FO-like combiners and hybrid post-quantum cryptography | 2022-06-29 | Paper |
| Towards efficient LPN-based symmetric encryption | 2022-03-21 | Paper |
| Beyond security and efficiency: on-demand ratcheting with security awareness | 2021-12-21 | Paper |
| On the effectiveness of time travel to inject COVID-19 alerts | 2021-12-20 | Paper |
| \(\mathsf{BioLocker}\): a practical biometric authentication mechanism based on 3D fingervein | 2021-02-23 | Paper |
| Classical misuse attacks on NIST round 2 PQC. The power of rank-based schemes | 2021-02-23 | Paper |
| Sublinear bounds on the distinguishing advantage for multiple samples | 2021-02-23 | Paper |
| Symmetric asynchronous ratcheted communication with associated data | 2021-02-23 | Paper |
| Misuse attacks on post-quantum cryptosystems | 2020-02-06 | Paper |
| Cryptanalysis of Enhanced MORE | 2019-09-30 | Paper |
| Side-channel attacks on threshold implementations using a glitch algebra | 2018-10-26 | Paper |
| Secure contactless payment | 2018-09-26 | Paper |
| Generic round-function-recovery attacks for Feistel networks over small domains | 2018-08-10 | Paper |
| Can CAESAR beat Galois? Robustness of CAESAR candidates against nonce reusing and high data complexity attacks | 2018-08-10 | Paper |
| Formal analysis of distance bounding with secure hardware | 2018-08-10 | Paper |
| \(\mathsf{xmx}\): a firmware-oriented block cipher based on modular multiplications | 2018-05-09 | Paper |
| CS-Cipher | 2018-05-09 | Paper |
| Cryptanalysis of a homomorphic encryption scheme | 2018-01-29 | Paper |
| On the weak keys of blowfish | 2017-11-15 | Paper |
| Breaking the FF3 format-preserving encryption standard over small domains | 2017-11-15 | Paper |
| Authenticated encryption with variable stretch | 2017-02-01 | Paper |
| Optimization of \(\mathsf {LPN}\) solving algorithms | 2017-02-01 | Paper |
| Efficient public-key distance bounding protocol | 2017-01-06 | Paper |
| Cryptanalysis of chosen symmetric homomorphic schemes | 2016-11-25 | Paper |
| On solving LPN using BKW and variants, Implementation and analysis | 2016-05-04 | Paper |
| Clever arbiters versus malicious adversaries. On the gap between known-input security and chosen-input security | 2016-05-02 | Paper |
| OMD: a compression function mode of operation for authenticated encryption | 2016-04-13 | Paper |
| How to sequentialize independent parallel attacks? Biased distributions have a phase transition | 2016-03-23 | Paper |
| Optimal Proximity Proofs Revisited | 2016-03-10 | Paper |
| Sound proof of proximity of knowledge | 2016-01-27 | Paper |
| On privacy for RFID | 2016-01-27 | Paper |
| Capacity and data complexity in multidimensional linear attack | 2015-12-10 | Paper |
| Optimal proximity proofs | 2015-11-25 | Paper |
| Hidden Collisions on DSS | 2015-11-11 | Paper |
| Better algorithms for LWE and LWR | 2015-09-30 | Paper |
| Misuse-resistant variants of the OMD authenticated encryption mode | 2015-09-29 | Paper |
| Towards secure distance bounding | 2015-09-18 | Paper |
| Boosting OMD for almost free authentication of associated data | 2015-09-18 | Paper |
| Smashing WEP in a passive attack | 2015-09-18 | Paper |
| Protecting against multidimensional linear and truncated differential cryptanalysis by decorrelation | 2015-09-18 | Paper |
| Compact and efficient UC commitments under atomic-exchanges | 2015-09-11 | Paper |
| On the key schedule of lightweight block ciphers | 2015-09-10 | Paper |
| Improved linear cryptanalysis of reduced-round MIBS | 2015-05-27 | Paper |
| Revisiting iterated attacks in the context of decorrelation theory | 2014-10-08 | Paper |
| Short 2-Move Undeniable Signatures | 2014-08-21 | Paper |
| Resistance against adaptive plaintext-ciphertext iterated distinguishers | 2014-08-20 | Paper |
| On selection of samples in algebraic attacks and a new technique to find hidden low degree equations | 2014-07-24 | Paper |
| Breaking the IOC authenticated encryption mode | 2014-06-24 | Paper |
| Primeless factoring-based cryptography. Solving the complexity bottleneck of public-key generation | 2014-01-24 | Paper |
| Input-aware equivocable commitments and UC-secure commitments with atomic exchanges | 2013-10-23 | Paper |
| On modeling terrorist frauds. Addressing collusion in distance bounding protocols | 2013-10-23 | Paper |
| Secure and lightweight distance-bounding | 2013-10-10 | Paper |
| Synthetic linear analysis with applications to CubeHash and Rabbit | 2013-06-24 | Paper |
| HELEN: a public-key cryptosystem based on the LPN and the decisional minimal distance problems | 2013-06-07 | Paper |
| The Bussard-Bagga and Other Distance-Bounding Protocols under Attacks | 2013-05-28 | Paper |
| ElimLin algorithm revisited | 2013-01-08 | Paper |
| Several weak bit-commitments using seal-once tamper-evident devices | 2012-11-06 | Paper |
| Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit | 2012-11-01 | Paper |
| Resistance against iterated attacks by decorrelation revisited | 2012-09-25 | Paper |
| On the pseudorandom function assumption in (secure) distance-bounding protocols. PRF-ness alone does not stop the frauds! | 2012-09-21 | Paper |
| Short undeniable signatures based on group homomorphisms | 2012-09-21 | Paper |
| Deniable RSA signature. The raise and fall of Ali Baba | 2012-06-08 | Paper |
| On Hiding a Plaintext Length by Preencryption | 2011-06-28 | Paper |
| Statistical attack on RC4. Distinguishing WPA | 2011-05-27 | Paper |
| Discovery and exploitation of new biases in RC4 | 2011-03-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3064319 | 2010-12-21 | Paper |
| Cryptanalysis of reduced-round MIBS block cipher | 2010-12-07 | Paper |
| Distinguishing distributions using Chernoff information | 2010-10-12 | Paper |
| ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware | 2010-08-17 | Paper |
| How to safely close a discussion | 2010-01-29 | Paper |
| Optimal key ranking procedures in a statistical cryptanalysis. | 2010-01-05 | Paper |
| Generating anomalous elliptic curves | 2009-08-27 | Paper |
| On the Impossibility of Strong Encryption Over $\aleph_0$ | 2009-07-23 | Paper |
| Cryptanalysis of an E0-like combiner with memory | 2009-06-08 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Smashing SQUASH-0 | 2009-05-12 | Paper |
| $\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher | 2009-03-06 | Paper |
| Hash-and-Sign with Weak Hashing Made Secure | 2009-03-06 | Paper |
| On the Security of HB# against a Man-in-the-Middle Attack | 2009-02-10 | Paper |
| The Complexity of Distinguishing Distributions (Invited Talk) | 2009-01-09 | Paper |
| On Privacy Models for RFID | 2008-05-15 | Paper |
| RFID Privacy Based on Public-Key Cryptography | 2008-05-06 | Paper |
| Linear Cryptanalysis of Non Binary Ciphers | 2008-03-25 | Paper |
| Passive–Only Key Recovery Attacks on RC4 | 2008-03-25 | Paper |
| The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption | 2008-03-17 | Paper |
| Secure Communications over Insecure Channels Based on Short Authenticated Strings | 2008-03-17 | Paper |
| When Stream Cipher Analysis Meets Public-Key Cryptography | 2007-11-29 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| Proving the Security of AES Substitution-Permutation Network | 2007-11-15 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Information Security and Cryptology | 2006-11-14 | Paper |
| Information Security | 2006-10-20 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Selected Areas in Cryptography | 2005-12-27 | Paper |
| A Classical Introduction to Cryptography Exercise Book | 2005-11-17 | Paper |
| A Classical Introduction to Cryptography | 2005-11-01 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| How Far Can We Go Beyond Linear Cryptanalysis? | 2005-08-12 | Paper |
| Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 | 2005-08-12 | Paper |
| Generic Homomorphic Undeniable Signatures | 2005-08-12 | Paper |
| Decorrelation: a theory for block cipher security | 2004-09-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4737269 | 2004-08-11 | Paper |
| Decorrelation over infinite domains: The encrypted CBC-MAC case | 2004-05-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4452557 | 2004-03-01 | Paper |
| The Security of DSA and ECDSA | 2003-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536246 | 2003-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536248 | 2003-02-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536239 | 2002-11-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4537983 | 2002-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249333 | 2002-05-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2762754 | 2002-01-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2762741 | 2002-01-09 | Paper |
| Cryptanalysis of the Chor-Rivest cryptosystem | 2001-11-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707426 | 2001-08-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4502479 | 2000-09-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4499405 | 2000-08-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941817 | 2000-08-24 | Paper |
| On the need for multipermutations: Cryptanalysis of MD4 and SAFER | 2000-06-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4949323 | 2000-05-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4949326 | 2000-05-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4950051 | 2000-05-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250801 | 2000-02-01 | Paper |
| The black-box model for cryptographic primitives | 1999-10-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250766 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250807 | 1999-06-17 | Paper |
| The security of the birational permutation signature schemes | 1999-01-31 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4381390 | 1998-05-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4365730 | 1998-02-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4365754 | 1998-01-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341770 | 1997-12-15 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4318727 | 1995-03-30 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4276338 | 1994-01-27 | Paper |