| Publication | Date of Publication | Type |
|---|
| Post-quantum verifiable random function from symmetric primitives in PoS blockchain | 2023-07-21 | Paper |
| Tuple cryptanalysis: slicing and fusing multisets | 2017-10-23 | Paper |
| Higher order differentiation over finite fields with applications to generalising the cube attack | 2017-09-28 | Paper |
| Cryptanalysis of a new image alternate encryption algorithm based on chaotic map | 2016-12-16 | Paper |
| Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme | 2016-07-01 | Paper |
| Comparison of Cube Attacks Over Different Vector Spaces | 2016-01-12 | Paper |
| IMPOSSIBLE DIFFERENTIAL CRYPTANALYSIS OF MINI-AES | 2015-11-13 | Paper |
| FURTHER NOTES FOR A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS | 2015-11-13 | Paper |
| Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis | 2015-11-11 | Paper |
| Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards | 2015-09-07 | Paper |
| A provable secure pairing-free certificateless identification scheme | 2015-07-30 | Paper |
| The hash function \texttt{BLAKE} | 2014-12-15 | Paper |
| On the security of a modified Beth identity-based identification scheme | 2014-04-11 | Paper |
| Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester | 2014-01-29 | Paper |
| Efficient generation of elementary sequences | 2014-01-17 | Paper |
| Computing the linear complexity for sequences with characteristic polynomial \(f^v\) | 2013-08-02 | Paper |
| Attribution of attack trees | 2013-05-31 | Paper |
| On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers | 2013-03-28 | Paper |
| On Integral Distinguishers of Rijndael Family of Ciphers | 2013-03-21 | Paper |
| Index Tables of Finite Fields and Modular Golomb Rulers | 2012-09-07 | Paper |
| Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09 | 2012-07-20 | Paper |
| Fooling a liveness-detecting capacitive fingerprint scanner | 2012-06-08 | Paper |
| On the stability of \(m\)-sequences | 2011-12-16 | Paper |
| Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol | 2011-07-29 | Paper |
| Advanced differential-style cryptanalysis of the NSA's Skipjack block cipher | 2011-07-14 | Paper |
| Notions and relations for RKA-secure permutation and function families | 2011-06-03 | Paper |
| Integral distinguishers of some SHA-3 candidates | 2010-12-07 | Paper |
| Improved cryptanalysis of Skein | 2009-12-15 | Paper |
| On the Impossibility of Strong Encryption Over $\aleph_0$ | 2009-07-23 | Paper |
| Impossible differential cryptanalysis of 7-round advanced encryption standard (AES) | 2009-07-21 | Paper |
| Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks | 2009-07-07 | Paper |
| Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
| Improved Related-key Attacks on DESX and DESX+ | 2009-03-23 | Paper |
| Proxy Re-signatures in the Standard Model | 2008-11-20 | Paper |
| The Hash Function Family LAKE | 2008-09-18 | Paper |
| Tampering with a watermarking-based image authentication scheme | 2008-09-01 | Paper |
| Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) | 2008-06-25 | Paper |
| Traceable Privacy of Recent Provably-Secure RFID Protocols | 2008-06-13 | Paper |
| How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? | 2008-06-13 | Paper |
| On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers | 2008-06-10 | Paper |
| Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication | 2008-06-10 | Paper |
| Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols | 2008-04-11 | Paper |
| Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme | 2007-09-24 | Paper |
| Applied Cryptography and Network Security | 2007-05-02 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Information Security | 2006-10-20 | Paper |
| Information Security | 2006-10-16 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413320 | 2003-07-17 | Paper |