Publication | Date of Publication | Type |
---|
Practical-time related-key attack on GOST with secret S-boxes | 2024-02-02 | Paper |
Quantum time/memory/data tradeoff attacks | 2024-01-15 | Paper |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation | 2023-12-08 | Paper |
Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting | 2023-08-14 | Paper |
Counting active S-boxes is not enough | 2022-07-06 | Paper |
Automatic search for bit-based division property | 2022-06-15 | Paper |
Practical key recovery attacks on FlexAEAD | 2022-03-31 | Paper |
Three third generation attacks on the format preserving encryption scheme FF3 | 2021-12-08 | Paper |
New slide attacks on almost self-similar ciphers | 2021-12-01 | Paper |
The retracing boomerang attack | 2021-12-01 | Paper |
Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} | 2021-11-25 | Paper |
Tight Bounds on Online Checkpointing Algorithms | 2021-07-28 | Paper |
Tight Bounds on Online Checkpointing Algorithms | 2021-05-03 | Paper |
A practical forgery attack on Lilliput-AE | 2020-06-15 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities | 2020-06-15 | Paper |
DLCT: a new tool for differential-linear cryptanalysis | 2020-02-04 | Paper |
Efficient dissection of bicomposite problems with cryptanalytic applications | 2019-11-27 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities | 2018-09-26 | Paper |
Efficient slide attacks | 2018-09-14 | Paper |
Efficient construction of diamond structures | 2018-04-26 | Paper |
New second preimage attacks on dithered hash functions with low memory complexity | 2018-02-16 | Paper |
Boosting authenticated encryption robustness with minimal modifications | 2017-10-27 | Paper |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | 2017-07-12 | Paper |
Low-Data Complexity Attacks on AES | 2017-06-08 | Paper |
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction | 2017-04-12 | Paper |
Memory-Efficient Algorithms for Finding Needles in Haystacks | 2016-10-27 | Paper |
New second-preimage attacks on hash functions | 2016-10-13 | Paper |
Key recovery attacks on iterated Even-Mansour encryption schemes | 2016-10-13 | Paper |
New Attacks on Feistel Structures with Improved Memory Complexities | 2015-12-10 | Paper |
Reflections on slide with a twist attacks | 2015-10-26 | Paper |
Cryptanalysis of SP Networks with Partial Non-Linear Layers | 2015-09-30 | Paper |
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials | 2015-09-18 | Paper |
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 | 2015-09-18 | Paper |
Improved Top-Down Techniques in Differential Cryptanalysis | 2015-09-17 | Paper |
Almost universal forgery attacks on AES-based MAC's | 2015-09-01 | Paper |
Practical-time attacks against reduced variants of~MISTY1 | 2015-09-01 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 | 2015-08-03 | Paper |
New attacks on IDEA with at least 6 rounds | 2015-05-12 | Paper |
Slidex attacks on the Even-Mansour encryption scheme | 2015-03-25 | Paper |
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys | 2015-01-16 | Paper |
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony | 2015-01-07 | Paper |
Improved practical attacks on round-reduced Keccak | 2014-09-25 | Paper |
From Multiple Encryption to Knapsacks – Efficient Dissection of Composite Problems | 2014-08-20 | Paper |
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 | 2013-12-10 | Paper |
Cryptanalysis of the stream cipher LEX | 2013-05-06 | Paper |
Improved Attacks on Full GOST | 2013-01-08 | Paper |
New Attacks on Keccak-224 and Keccak-256 | 2013-01-08 | Paper |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | 2012-09-25 | Paper |
Minimalism in Cryptography: The Even-Mansour Scheme Revisited | 2012-06-29 | Paper |
New Insights on Impossible Differential Cryptanalysis | 2012-06-08 | Paper |
A practical attack on KeeLoq | 2012-05-23 | Paper |
Techniques for cryptanalysis of block ciphers. (to appear) | 2012-03-16 | Paper |
Linear Analysis of Reduced-Round CubeHash | 2011-06-28 | Paper |
Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 | 2011-03-15 | Paper |
Improved Single-Key Attacks on 8-Round AES-192 and AES-256 | 2010-12-07 | Paper |
The effects of the omission of last round's MixColumns on AES | 2010-09-07 | Paper |
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | 2010-08-24 | Paper |
Another Look at Complementation Properties | 2010-07-13 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds | 2010-06-01 | Paper |
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers | 2010-04-19 | Paper |
Fast Software Encryption | 2010-01-05 | Paper |
Fast Software Encryption | 2010-01-05 | Paper |
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode | 2009-12-17 | Paper |
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård | 2009-12-09 | Paper |
Cryptanalysis of Dynamic SHA(2) | 2009-12-09 | Paper |
KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers | 2009-11-10 | Paper |
Cryptanalysis of Vortex | 2009-07-07 | Paper |
Cryptanalysis of CTC2 | 2009-04-29 | Paper |
An Improved Impossible Differential Attack on MISTY1 | 2009-02-10 | Paper |
A New Attack on the LEX Stream Cipher | 2009-02-10 | Paper |
New Impossible Differential Attacks on AES | 2009-01-22 | Paper |
A Differential-Linear Attack on 12-Round Serpent | 2009-01-22 | Paper |
A New Criterion for Nonlinearity of Block Ciphers | 2008-12-21 | Paper |
A Unified Approach to Related-Key Attacks | 2008-09-18 | Paper |
Improved Slide Attacks | 2008-09-16 | Paper |
A New Attack on 6-Round IDEA | 2008-09-16 | Paper |
Related-Key Rectangle Attack on 42-Round SHACAL-2 | 2008-06-17 | Paper |
Related-Key Boomerang and Rectangle Attacks | 2008-05-06 | Paper |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 | 2008-04-24 | Paper |
New Cryptanalytic Results on IDEA | 2008-04-24 | Paper |
A Simple Related-Key Attack on the Full SHACAL-1 | 2008-04-17 | Paper |
A Practical Attack on KeeLoq | 2008-04-15 | Paper |
Improved Meet-in-the-Middle Attacks on Reduced-Round DES | 2008-04-11 | Paper |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1 | 2008-04-11 | Paper |
The Delicate Issues of Addition with Respect to XOR Differences | 2008-03-25 | Paper |
A Related-Key Rectangle Attack on the Full KASUMI | 2008-03-18 | Paper |
Related-Key Rectangle Attack on the Full SHACAL-1 | 2007-11-29 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
Fast Software Encryption | 2006-06-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q3046332 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3046336 | 2004-08-12 | Paper |
Linear Cryptanalysis of Reduced Round Serpent | 2004-08-12 | Paper |
Enhancing Differential-Linear Cryptanalysis | 2003-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q2778856 | 2002-03-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2707591 | 2001-07-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250830 | 2000-02-01 | Paper |