| Publication | Date of Publication | Type |
|---|
| A new sieving-style information-set decoding algorithm | 2025-01-23 | Paper |
| SCA-LDPC: a code-based framework for key-recovery side-channel attacks on post-quantum encryption schemes | 2024-09-13 | Paper |
| Faster Dual Lattice Attacks for Solving LWE with Applications to CRYSTALS | 2023-05-26 | Paper |
| A new decryption failure attack against HQC | 2023-03-21 | Paper |
| A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM | 2022-11-09 | Paper |
| Making the BKW algorithm practical for LWE | 2022-07-06 | Paper |
| Grain-128AEADv2: strengthening the initialization against key reconstruction | 2022-06-29 | Paper |
| Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator | 2022-02-17 | Paper |
| A novel CCA attack using decryption errors against LAC | 2020-05-20 | Paper |
| Solving LPN using covering codes | 2020-03-03 | Paper |
| Decryption failure attacks on IND-CCA secure lattice-based schemes | 2020-01-28 | Paper |
| An AEAD variant of the Grain stream cipher | 2019-10-14 | Paper |
| Some cryptanalytic and coding-theoretic applications of a soft Stern algorithm | 2019-09-19 | Paper |
| On the Asymptotics of Solving the LWE Problem Using Coded-BKW With Sieving | 2019-07-19 | Paper |
| A new birthday-type algorithm for attacking the fresh re-keying countermeasure | 2019-04-26 | Paper |
| A Key Recovery Reaction Attack on QC-MDPC | 2019-03-28 | Paper |
| A reaction attack on the QC-LDPC McEliece cryptosystem | 2018-09-12 | Paper |
| Coded-BKW with sieving | 2018-04-06 | Paper |
| Improved Distinguishers on Stream Ciphers With Certain Weak Feedback Polynomials | 2017-06-08 | Paper |
| A New Algorithm for Solving Ring-LPN With a Reducible Polynomial | 2017-04-28 | Paper |
| A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors | 2017-02-01 | Paper |
| Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension | 2016-09-08 | Paper |
| Coded-BKW: Solving LWE Using Lattice Codes | 2015-12-10 | Paper |
| Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings | 2015-11-11 | Paper |
| A generalized birthday approach for efficiently finding linear relations in \(\ell\)-sequences | 2015-01-23 | Paper |
| Solving LPN Using Covering Codes | 2015-01-16 | Paper |
| Improved algorithms for finding low-weight polynomial multiples in \(\mathbb F_2[x]\) and some cryptographic applications | 2014-08-18 | Paper |
| Linear Attacks on Stream Ciphers | 2014-08-07 | Paper |
| An efficient state recovery attack on the X-FCSR family of stream ciphers | 2014-04-01 | Paper |
| A survey on fast correlation attacks | 2013-06-24 | Paper |
| Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time | 2012-09-21 | Paper |
| Analysis of Xorrotation with Application to an HC-128 Variant | 2012-09-07 | Paper |
| Improved distinguishers for HC-128 | 2012-03-23 | Paper |
| Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere | 2011-12-16 | Paper |
| On Equivalence Classes of Boolean Functions | 2011-10-27 | Paper |
| A Note on Fast Algebraic Attacks and Higher Order Nonlinearities | 2011-07-29 | Paper |
| An overview of distinguishing attacks on stream ciphers | 2009-10-26 | Paper |
| An Efficient State Recovery Attack on X-FCSR-256 | 2009-08-11 | Paper |
| Cryptanalysis of Achterbahn | 2009-04-02 | Paper |
| Breaking the F-FCSR-H Stream Cipher in Real Time | 2009-02-10 | Paper |
| Two New Attacks on the Self-Shrinking Generator | 2008-12-21 | Paper |
| A Linear Distinguishing Attack on Scream | 2008-12-21 | Paper |
| Two General Attacks on Pomaranch-Like Keystream Generators | 2008-09-16 | Paper |
| A Key Recovery Attack on Edon80 | 2008-05-15 | Paper |
| A Framework for Chosen IV Statistical Analysis of Stream Ciphers | 2008-04-11 | Paper |
| Fast Computation of Large Distributions and Its Cryptographic Applications | 2008-03-18 | Paper |
| Cryptanalysis of Achterbahn-Version 2 | 2007-11-29 | Paper |
| On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2 | 2007-11-29 | Paper |
| Cryptography and Coding | 2007-11-28 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Fast Software Encryption | 2006-06-22 | Paper |
| Fast Software Encryption | 2006-06-22 | Paper |
| Fast Software Encryption | 2005-12-27 | Paper |
| A construction of resilient functions with high nonlinearity | 2005-05-31 | Paper |
| Another attack on A5/1 | 2005-05-31 | Paper |
| Theoretical analysis of a correlation attack based on convolutional codes | 2005-05-11 | Paper |
| On the complexity of some cryptographic problems based on the general decoding problem | 2005-05-11 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3046357 | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434884 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4417409 | 2003-07-29 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413853 | 2003-07-21 | Paper |
| Further results on asymmetric authentication schemes | 2003-01-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4537991 | 2002-11-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536809 | 2002-10-07 | Paper |
| A fast correlation attack on LILI-128 | 2002-07-14 | Paper |
| Almost \(k\)-wise independent sample spaces and their cryptologic applications | 2002-01-02 | Paper |
| New constructions of resilient and correlation immune Boolean functions achieving upper bound on nonlinearity | 2001-10-14 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941855 | 2001-02-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4945349 | 2000-03-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249278 | 2000-03-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4934703 | 2000-01-31 | Paper |
| A simple one-sweep algorithm for optimal APP symbol decoding of linear block codes | 1999-11-21 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4250772 | 1999-06-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4365767 | 1998-06-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341759 | 1997-09-17 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4341758 | 1997-06-18 | Paper |
| On the cardinality of systematic authentication codes via error-correcting codes | 1997-01-28 | Paper |
| Authentication codes for nontrusting parties obtained from rank metric codes | 1995-12-20 | Paper |
| Lower bounds on the probability of deception in authentication with arbitration | 1995-03-01 | Paper |
| A shift register construction of unconditionally secure authentication codes | 1994-06-26 | Paper |