| Publication | Date of Publication | Type |
|---|
| We are on the same side. Alternative sieving strategies for the number field sieve | 2024-09-13 | Paper |
| Computing \(e\)-th roots in number fields | 2024-05-29 | Paper |
| Masking the GLP lattice-based signature scheme at any order | 2024-01-23 | Paper |
| A generic transform from multi-round interactive proof to NIZK | 2023-11-16 | Paper |
| Revisiting related-key boomerang attacks on AES using computer-aided tool | 2023-08-25 | Paper |
| Computing $e$-th roots in number fields | 2023-05-27 | Paper |
| Faster enumeration-based lattice reduction: root Hermite factor \(k^{1/(2k)}\) time \(k^{k/8+o(k)}\) | 2022-11-09 | Paper |
| Fast reduction of algebraic lattices over cyclotomic fields | 2022-11-09 | Paper |
| \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} | 2022-08-30 | Paper |
| Towards faster polynomial-time lattice reduction | 2022-04-22 | Paper |
| SSE and SSD: page-efficient searchable symmetric encryption | 2022-04-22 | Paper |
| Key recovery from Gram-Schmidt norm leakage in hash-and-sign signatures over NTRU lattices | 2021-12-01 | Paper |
| Multi-device for Signal | 2021-02-23 | Paper |
| Linearly equivalent s-boxes and the division property | 2020-10-07 | Paper |
| Masking Dilithium. Efficient implementation and side-channel evaluation | 2020-01-30 | Paper |
| Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond | 2019-12-10 | Paper |
| Variants of the AES key schedule for better truncated differential bounds | 2019-02-20 | Paper |
| Close to Uniform Prime Number Generation With Fewer Random Bits | 2019-01-28 | Paper |
| Pattern matching on encrypted streams | 2018-12-20 | Paper |
| LWE without modular reduction and improved side-channel attacks against BLISS | 2018-12-20 | Paper |
| Loop-Abort Faults on Lattice-Based Signatures and Key Exchange Protocols | 2018-12-04 | Paper |
| Key-recovery attacks on \(\mathsf{ASASA}\) | 2018-09-14 | Paper |
| Fast lattice-based encryption: stretching SPRING | 2018-09-12 | Paper |
| Masking the GLP lattice-based signature scheme at any order | 2018-07-09 | Paper |
| Practical implementation of Ring-SIS/LWE based signature and IBE | 2018-06-22 | Paper |
| Loop-abort faults on lattice-based Fiat-Shamir and hash-and-sign signatures | 2018-02-16 | Paper |
| Improved side-channel analysis of finite-field multiplication | 2018-02-14 | Paper |
| Revisiting Lattice Attacks on Overstretched NTRU Parameters | 2017-06-13 | Paper |
| Computing generator in cyclotomic integer rings. A subfield algorithm for the principal ideal problem in \(L_{|\varDelta_\mathbb {K}|}\left(\frac{1}{2}\right)\) and application to the cryptanalysis of a FHE scheme | 2017-06-13 | Paper |
| Low-Data Complexity Attacks on AES | 2017-06-08 | Paper |
| Efficient and Provable White-Box Primitives | 2017-02-01 | Paper |
| Automatic search of meet-in-the-middle and impossible differential attacks | 2016-10-27 | Paper |
| New second-preimage attacks on hash functions | 2016-10-13 | Paper |
| Assisted identification of mode of operation in binary code with dynamic data flow slicing | 2016-10-04 | Paper |
| Tightly secure signatures from lossy identification schemes | 2016-09-21 | Paper |
| Cryptanalysis of the new CLT multilinear map over the integers | 2016-09-09 | Paper |
| Homomorphic evaluation of lattice-based symmetric encryption schemes | 2016-09-02 | Paper |
| Safe-errors on SPA protected implementations with the atomicity technique | 2016-05-02 | Paper |
| Binary elligator squared | 2016-04-13 | Paper |
| Diffusion matrices from algebraic-geometry codes with efficient SIMD implementation | 2016-04-13 | Paper |
| Side-channel analysis of Weierstrass and Koblitz curve ECDSA on Android smartphones | 2016-04-08 | Paper |
| Key-recovery attacks on \(\mathsf {ASASA}\) | 2016-03-23 | Paper |
| Practical multi-candidate election system | 2016-03-04 | Paper |
| An improved BKW algorithm for LWE with applications to cryptography and lattices | 2015-12-10 | Paper |
| Cryptanalysis of the co-ACD assumption | 2015-12-10 | Paper |
| Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE | 2015-12-10 | Paper |
| Verified Proofs of Higher-Order Masking | 2015-09-30 | Paper |
| Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks | 2015-09-18 | Paper |
| Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES | 2015-09-18 | Paper |
| Making RSA–PSS Provably Secure against Non-random Faults | 2015-07-21 | Paper |
| Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE | 2015-01-16 | Paper |
| GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias | 2015-01-16 | Paper |
| Side-Channel Analysis of Multiplications in GF(2128) | 2015-01-06 | Paper |
| Statistical properties of short RSA distribution and their cryptographic applications | 2014-09-26 | Paper |
| Faster chosen-key distinguishers on reduced-round AES | 2014-08-20 | Paper |
| Close to uniform prime number generation with fewer random bits | 2014-07-01 | Paper |
| Recovering private keys generated with weak PRNGs | 2014-01-17 | Paper |
| Security amplification against meet-in-the-middle attacks using whitening | 2014-01-17 | Paper |
| Leakage-resilient symmetric encryption via re-keying | 2013-10-10 | Paper |
| Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128 | 2013-09-02 | Paper |
| Injective encodings to elliptic curves | 2013-06-28 | Paper |
| Time/memory/data tradeoffs for variants of the RSA problem | 2013-06-11 | Paper |
| Graph-theoretic algorithms for the ``isomorphism of polynomials problem | 2013-05-31 | Paper |
| Improved key recovery attacks on reduced-round AES in the single-key setting | 2013-05-31 | Paper |
| Meet-in-the-middle attack on reduced versions of the Camellia block cipher | 2013-04-04 | Paper |
| Indifferentiable deterministic hashing to elliptic and hyperelliptic curves | 2013-03-20 | Paper |
| Timing attack against protected RSA-CRT implementation used in PolarSSL | 2013-03-18 | Paper |
| Attacking RSA-CRT signatures with faults on Montgomery multiplication | 2012-11-13 | Paper |
| Indifferentiable hashing to Barreto-Naehrig curves | 2012-09-21 | Paper |
| Tightly-secure signatures from lossy identification schemes | 2012-06-29 | Paper |
| New insights on impossible differential cryptanalysis | 2012-06-08 | Paper |
| A family of weak keys in HFE and the corresponding practical key-recovery | 2012-03-22 | Paper |
| Practical Key-Recovery for All Possible Parameters of SFLASH | 2011-12-02 | Paper |
| Automatic search of attacks on round-reduced AES and applications | 2011-08-12 | Paper |
| Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function | 2011-07-07 | Paper |
| Cryptocomputing with rationals | 2011-04-20 | Paper |
| Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem | 2011-03-15 | Paper |
| Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\) | 2011-03-15 | Paper |
| Security analysis of SIMD | 2011-03-15 | Paper |
| Deterministic encoding and hashing to odd hyperelliptic curves | 2010-11-26 | Paper |
| Estimating the size of the image of deterministic hash functions to elliptic curves | 2010-08-31 | Paper |
| Another look at complementation properties | 2010-07-13 | Paper |
| On some incompatible properties of voting schemes | 2010-06-17 | Paper |
| The doubling attack -- why upwards is better than downwards. | 2010-03-09 | Paper |
| Attacking unbalanced RSA-CRT using SPA. | 2010-03-09 | Paper |
| The insecurity of Esign in practical implementations | 2010-01-05 | Paper |
| Practical symmetric on-line encryption. | 2010-01-05 | Paper |
| Cryptanalysis of Tweaked Versions of SMASH and Reparation | 2009-11-03 | Paper |
| Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques | 2009-11-03 | Paper |
| Optimal Randomness Extraction from a Diffie-Hellman Element | 2009-05-12 | Paper |
| Practical Cryptanalysis of SFLASH | 2009-03-10 | Paper |
| Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | 2009-03-10 | Paper |
| An Improved LPN Algorithm | 2008-11-27 | Paper |
| Power Attack on Small RSA Public Exponent | 2008-08-29 | Paper |
| Differential Cryptanalysis for Multivariate Schemes | 2008-05-06 | Paper |
| Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes | 2008-04-24 | Paper |
| Second Preimage Attacks on Dithered Hash Functions | 2008-04-15 | Paper |
| Key Recovery on Hidden Monomial Multivariate Schemes | 2008-04-15 | Paper |
| A Simple Threshold Authenticated Key Exchange from Short Secrets | 2008-03-18 | Paper |
| Total Break of the ℓ-IC Signature Scheme | 2008-03-05 | Paper |
| Cryptanalysis of SFLASH with Slightly Modified Parameters | 2007-11-29 | Paper |
| Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes | 2007-09-11 | Paper |
| Public Key Cryptography - PKC 2006 | 2007-05-02 | Paper |
| Selected Areas in Cryptography | 2006-10-10 | Paper |
| Selected Areas in Cryptography | 2005-12-27 | Paper |
| Public Key Cryptography - PKC 2005 | 2005-12-07 | Paper |
| Cryptographic Hardware and Embedded Systems - CHES 2004 | 2005-08-23 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474182 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474184 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434893 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4536289 | 2002-11-28 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724603 | 2002-09-11 | Paper |