| Publication | Date of Publication | Type |
|---|
| \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations | 2022-03-24 | Paper |
Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis Journal of Applied Mathematics | 2018-10-10 | Paper |
| Cryptanalysis of CIKS-128 and CIKS-128H suitable for intelligent multimedia and ubiquitous computing systems | 2017-04-03 | Paper |
Provable security for 13 round Skipjack-like structure Information Processing Letters | 2016-06-16 | Paper |
| scientific article; zbMATH DE number 6499823 (Why is no real title available?) | 2015-10-28 | Paper |
Improved fast correlation attack on the shrinking and self-shrinking generators Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Improved differential fault analysis on PRESENT-80/128 International Journal of Computer Mathematics | 2014-01-29 | Paper |
Differential cryptanalysis of eight-round SEED Information Processing Letters | 2013-03-28 | Paper |
Differential fault analysis on block cipher SEED Mathematical and Computer Modelling | 2012-08-24 | Paper |
Notions and relations for RKA-secure permutation and function families Designs, Codes and Cryptography | 2011-06-03 | Paper |
Cryptanalysis of an involutional block cipher using cellular automata Information Processing Letters | 2010-03-24 | Paper |
A New Double-Block-Length Hash Function Using Feistel Structure Advances in Information Security and Assurance | 2009-06-25 | Paper |
A New Dedicated 256-Bit Hash Function: FORK-256 Fast Software Encryption | 2009-04-02 | Paper |
Preimage Attack on the Parallel FFT-Hashing Function Information Security and Privacy | 2009-03-06 | Paper |
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128 Information Security and Privacy | 2009-03-06 | Paper |
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL Fast Software Encryption | 2008-09-18 | Paper |
HIGHT: A New Block Cipher Suitable for Low-Resource Device Lecture Notes in Computer Science | 2008-08-29 | Paper |
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128 Information Security and Privacy | 2008-07-08 | Paper |
How to Construct Universal One-Way Hash Functions of Order r Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant Information Security and Privacy | 2007-09-07 | Paper |
Known-IV, known-in-Advance-IV, and replayed-and-Known-IV attacks on multiple modes of operation of block ciphers Journal of Cryptology | 2007-01-24 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
| scientific article; zbMATH DE number 2089315 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2081067 (Why is no real title available?) | 2004-08-04 | Paper |
| scientific article; zbMATH DE number 2043327 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1951611 (Why is no real title available?) | 2003-07-21 | Paper |
| scientific article; zbMATH DE number 1759647 (Why is no real title available?) | 2003-01-20 | Paper |
| scientific article; zbMATH DE number 1759276 (Why is no real title available?) | 2002-10-13 | Paper |
| scientific article; zbMATH DE number 1583785 (Why is no real title available?) | 2001-07-03 | Paper |