| Publication | Date of Publication | Type |
|---|
| The algebraic FreeLunch: efficient Gröbner basis attacks against arithmetization-oriented primitives | 2024-12-13 | Paper |
Analysis of multivariate encryption schemes: application to Dob and \(C^*\) Journal of Cryptology | 2024-05-13 | Paper |
Cryptanalysis of symmetric primitives over rings and a key recovery attack on \textsf{Rubato} Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
| FASTA -- a stream cipher for fast FHE evaluation | 2022-07-06 | Paper |
| Boolean polynomials, BDDs and CRHS equations -- connecting the dots with CryptaPath | 2022-03-25 | Paper |
| A practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem | 2022-03-22 | Paper |
| Analysis of multivariate encryption schemes: application to Dob | 2021-12-21 | Paper |
| Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 | 2021-12-08 | Paper |
Solving non-linear Boolean equation systems by variable elimination Applicable Algebra in Engineering, Communication and Computing | 2021-06-11 | Paper |
| Cryptanalysis of the multivariate encryption scheme EFLASH | 2020-08-05 | Paper |
Factorization using binary decision diagrams Cryptography and Communications | 2019-05-15 | Paper |
Faster key recovery attack on round-reduced PRINCE Lecture Notes in Computer Science | 2019-01-30 | Paper |
| Security notions for cloud storage and deduplication | 2018-11-07 | Paper |
MRHS solver based on linear algebra and exhaustive search Journal of Mathematical Cryptology | 2018-10-04 | Paper |
Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN Tatra Mountains Mathematical Publications | 2017-03-29 | Paper |
Cryptanalysis of PRINCE with minimal data Progress in Cryptology – AFRICACRYPT 2016 | 2016-06-22 | Paper |
Influence of addition modulo \(2^n\) on algebraic attacks Cryptography and Communications | 2016-04-19 | Paper |
Algebraic attacks using binary decision diagrams Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
Algebraic analysis of the Simon block cipher family Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Analysis of Trivium using compressed right hand side equations Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Solving compressed right hand side equation systems with linear absorption Lecture Notes in Computer Science | 2012-09-07 | Paper |
The Zodiac killer ciphers Tatra Mountains Mathematical Publications | 2010-10-14 | Paper |
Solving equation systems by agreeing and learning Arithmetic of Finite Fields | 2010-07-20 | Paper |
Cryptanalysis of IDEA-X/2. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Solving multiple right hand sides linear equations Designs, Codes and Cryptography | 2009-03-31 | Paper |
An Analysis of the Hermes8 Stream Ciphers Information Security and Privacy | 2009-03-06 | Paper |
On the Number of Linearly Independent Equations Generated by XL Sequences and Their Applications - SETA 2008 | 2009-02-10 | Paper |
Bit-Pattern Based Integral Attack Fast Software Encryption | 2008-09-18 | Paper |
MRHS Equation Systems Selected Areas in Cryptography | 2008-03-25 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
| scientific article; zbMATH DE number 2085205 (Why is no real title available?) | 2004-08-09 | Paper |
On the computation of coset leaders with high Hamming weight. Discrete Mathematics | 2004-01-26 | Paper |