| Publication | Date of Publication | Type |
|---|
Post-quantum verifiable random function from symmetric primitives in PoS blockchain Computer Security – ESORICS 2022 | 2023-07-21 | Paper |
| Tuple cryptanalysis: slicing and fusing multisets | 2017-10-23 | Paper |
Higher order differentiation over finite fields with applications to generalising the cube attack Designs, Codes and Cryptography | 2017-09-28 | Paper |
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map Nonlinear Dynamics | 2016-12-16 | Paper |
Twin-Beth: security under active and concurrent attacks for the Beth identity-based identification scheme Cryptography and Communications | 2016-07-01 | Paper |
Comparison of Cube Attacks Over Different Vector Spaces Cryptography and Coding | 2016-01-12 | Paper |
Impossible differential cryptanalysis of mini-AES Cryptologia | 2015-11-13 | Paper |
Further notes for a self-study course in block-cipher cryptanalysis Cryptologia | 2015-11-13 | Paper |
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards Nonlinear Dynamics | 2015-09-07 | Paper |
A provable secure pairing-free certificateless identification scheme International Journal of Computer Mathematics | 2015-07-30 | Paper |
The hash function \texttt{BLAKE} Information Security and Cryptography | 2014-12-15 | Paper |
On the security of a modified Beth identity-based identification scheme Information Processing Letters | 2014-04-11 | Paper |
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester International Journal of Computer Mathematics | 2014-01-29 | Paper |
Efficient generation of elementary sequences Cryptography and Coding | 2014-01-17 | Paper |
Computing the linear complexity for sequences with characteristic polynomial \(f^v\) Cryptography and Communications | 2013-08-02 | Paper |
Attribution of attack trees Computers and Electrical Engineering | 2013-05-31 | Paper |
On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers Information Processing Letters | 2013-03-28 | Paper |
On Integral Distinguishers of Rijndael Family of Ciphers Cryptologia | 2013-03-21 | Paper |
Index Tables of Finite Fields and Modular Golomb Rulers Lecture Notes in Computer Science | 2012-09-07 | Paper |
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '09 Cryptology and Network Security | 2012-07-20 | Paper |
Fooling a liveness-detecting capacitive fingerprint scanner Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
On the stability of \(m\)-sequences Cryptography and Coding | 2011-12-16 | Paper |
Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol Information Security and Cryptology | 2011-07-29 | Paper |
Advanced differential-style cryptanalysis of the NSA's Skipjack block cipher Cryptologia | 2011-07-14 | Paper |
Notions and relations for RKA-secure permutation and function families Designs, Codes and Cryptography | 2011-06-03 | Paper |
Integral distinguishers of some SHA-3 candidates Cryptology and Network Security | 2010-12-07 | Paper |
Improved cryptanalysis of Skein Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
On the Impossibility of Strong Encryption Over $\aleph_0$ Lecture Notes in Computer Science | 2009-07-23 | Paper |
Impossible differential cryptanalysis of 7-round advanced encryption standard (AES) Information Processing Letters | 2009-07-21 | Paper |
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Improved Related-key Attacks on DESX and DESX+ Cryptologia | 2009-03-23 | Paper |
Proxy Re-signatures in the Standard Model Lecture Notes in Computer Science | 2008-11-20 | Paper |
The Hash Function Family LAKE Fast Software Encryption | 2008-09-18 | Paper |
Tampering with a watermarking-based image authentication scheme Pattern Recognition | 2008-09-01 | Paper |
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE) Information Sciences | 2008-06-25 | Paper |
Traceable Privacy of Recent Provably-Secure RFID Protocols Applied Cryptography and Network Security | 2008-06-13 | Paper |
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
On the Notions of PRP-RKA, KR and KR-RKA for Block Ciphers Provable Security | 2008-06-10 | Paper |
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication Provable Security | 2008-06-10 | Paper |
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme Applied Cryptography and Network Security | 2007-09-24 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 1950609 (Why is no real title available?) | 2003-07-17 | Paper |