| Publication | Date of Publication | Type |
|---|
On the Role of Key Schedules in Attacks on Iterated Ciphers Computer Security – ESORICS 2004 | 2022-03-07 | Paper |
Multiple encryption with minimum key Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Serpent: a new block cipher proposal Fast Software Encryption | 2018-05-09 | Paper |
The interpolation attack on block ciphers Fast Software Encryption | 2018-05-09 | Paper |
The block cipher \textsc{Square} Fast Software Encryption | 2018-05-09 | Paper |
On the design and security of RC2 Fast Software Encryption | 2018-05-09 | Paper |
Differential Cryptanalysis of the ICE Encryption Algorithm Fast Software Encryption | 2018-05-09 | Paper |
Truncated differentials of SAFER Fast Software Encryption | 2017-11-15 | Paper |
Reflection ciphers Designs, Codes and Cryptography | 2017-02-10 | Paper |
Building indifferentiable compression functions from the PGV compression functions Designs, Codes and Cryptography | 2016-02-19 | Paper |
Ciphertext-only attack on Akelarre Cryptologia | 2015-11-13 | Paper |
Improved differential attacks on RC5 Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Security of the AES with a secret S-box Fast Software Encryption | 2015-09-18 | Paper |
Non-linear approximations in linear cryptanalysis Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
On the difficulty of software key escrow Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Slender-set differential cryptanalysis Journal of Cryptology | 2013-04-15 | Paper |
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Security analysis of randomize-hash-then-sign digital signatures Journal of Cryptology | 2013-01-04 | Paper |
On-line ciphers and the Hash-CBC constructions Journal of Cryptology | 2013-01-04 | Paper |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract) Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Cryptanalysis of PRESENT-like ciphers with secret S-boxes Fast Software Encryption | 2011-07-07 | Paper |
Improved security analysis of Fugue-256 (poster) Information Security and Privacy | 2011-07-07 | Paper |
Hill climbing algorithms and Trivium Selected Areas in Cryptography | 2011-03-15 | Paper |
The block cipher companion. Information Security and Cryptography | 2010-12-08 | Paper |
Distinguishers for the compression function and output transformation of Hamsi-256 Information Security and Privacy | 2010-10-25 | Paper |
PRINTcipher: A Block Cipher for IC-Printing Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Cryptanalysis of MD2 Journal of Cryptology | 2010-03-01 | Paper |
Bivium as a mixed-integer linear programming problem Cryptography and Coding | 2010-01-07 | Paper |
Analysis of RMAC. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 Selected Areas in Cryptography | 2009-12-09 | Paper |
Cryptanalysis of C2 Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Cryptanalysis of MDC-2 Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
The Grindahl Hash Functions Fast Software Encryption | 2008-09-16 | Paper |
Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography Applied Cryptography and Network Security | 2008-06-13 | Paper |
Known-Key Distinguishers for Some Block Ciphers Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Cryptanalysis of the CRUSH Hash Function Selected Areas in Cryptography | 2008-03-25 | Paper |
Some Attacks Against a Double Length Hash Proposal Lecture Notes in Computer Science | 2008-03-18 | Paper |
Partial key recovery attack against RMAC Journal of Cryptology | 2006-08-14 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
Construction of secure and fast hash functions using nonbinary error-correcting codes IEEE Transactions on Information Theory | 2005-05-11 | Paper |
scientific article; zbMATH DE number 2089131 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2085205 (Why is no real title available?) | 2004-08-09 | Paper |
Analysis of 3gpp-MAC and two-key 3gpp-MAC Discrete Applied Mathematics | 2003-06-10 | Paper |
scientific article; zbMATH DE number 1759316 (Why is no real title available?) | 2003-01-25 | Paper |
scientific article; zbMATH DE number 1842498 (Why is no real title available?) | 2002-12-08 | Paper |
The security of Feistel ciphers with six rounds or less Journal of Cryptology | 2002-12-01 | Paper |
scientific article; zbMATH DE number 1759275 (Why is no real title available?) | 2002-10-13 | Paper |
scientific article; zbMATH DE number 1759778 (Why is no real title available?) | 2002-07-28 | Paper |
scientific article; zbMATH DE number 1759264 (Why is no real title available?) | 2002-06-25 | Paper |
Cryptanalysis of the ANSI X9. 52 CBCM Mode Journal of Cryptology | 2002-05-21 | Paper |
Attacks on fast double block length hash functions Journal of Cryptology | 2001-11-22 | Paper |
Attacks on block ciphers of low algebraic degree Journal of Cryptology | 2001-11-07 | Paper |
An analysis of the 3gpp-MAC scheme | 2001-10-14 | Paper |
On the structure of Skipjack Discrete Applied Mathematics | 2001-07-29 | Paper |
scientific article; zbMATH DE number 1617919 (Why is no real title available?) | 2001-07-12 | Paper |
Linear frameworks for block ciphers Designs, Codes and Cryptography | 2001-02-18 | Paper |
scientific article; zbMATH DE number 1504777 (Why is no real title available?) | 2001-02-15 | Paper |
A detailed analysis of SAFER K Journal of Cryptology | 2000-12-21 | Paper |
scientific article; zbMATH DE number 1498337 (Why is no real title available?) | 2000-08-30 | Paper |
scientific article; zbMATH DE number 1498330 (Why is no real title available?) | 2000-08-30 | Paper |
scientific article; zbMATH DE number 1418294 (Why is no real title available?) | 2000-07-26 | Paper |
scientific article; zbMATH DE number 1455090 (Why is no real title available?) | 2000-06-05 | Paper |
scientific article; zbMATH DE number 1304083 (Why is no real title available?) | 2000-04-10 | Paper |
scientific article; zbMATH DE number 1418246 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1394324 (Why is no real title available?) | 2000-02-01 | Paper |
Two-key triple encryption Journal of Cryptology | 1999-09-12 | Paper |
scientific article; zbMATH DE number 1304187 (Why is no real title available?) | 1999-06-17 | Paper |
Analysis Methods for (Alleged) RC4 Lecture Notes in Computer Science | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1303116 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1088934 (Why is no real title available?) | 1998-04-22 | Paper |
scientific article; zbMATH DE number 1088255 (Why is no real title available?) | 1998-03-10 | Paper |
scientific article; zbMATH DE number 1088935 (Why is no real title available?) | 1997-12-14 | Paper |
scientific article; zbMATH DE number 1030998 (Why is no real title available?) | 1997-12-01 | Paper |
scientific article; zbMATH DE number 1024009 (Why is no real title available?) | 1997-07-20 | Paper |
scientific article; zbMATH DE number 721905 (Why is no real title available?) | 1995-12-17 | Paper |
Provable security against a differential attack Journal of Cryptology | 1995-08-08 | Paper |
scientific article; zbMATH DE number 708827 (Why is no real title available?) | 1995-04-04 | Paper |
scientific article; zbMATH DE number 697798 (Why is no real title available?) | 1995-04-04 | Paper |
scientific article; zbMATH DE number 708833 (Why is no real title available?) | 1995-01-09 | Paper |