| Publication | Date of Publication | Type |
|---|
| Time-space lower bounds for bounded-error computation in the random-query model | 2024-11-28 | Paper |
| Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis | 2024-11-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6126253 | 2024-04-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6147408 | 2024-01-15 | Paper |
| On differential privacy and adaptive data analysis with bounded space | 2023-12-12 | Paper |
| Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation | 2023-12-08 | Paper |
| Distributed Merkle's puzzles | 2023-04-13 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 | 2022-08-30 | Paper |
| On the streaming indistinguishability of a random permutation and a random function | 2022-03-23 | Paper |
| Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) | 2021-12-08 | Paper |
| Tight time-space lower bounds for finding multiple collision pairs and their applications | 2021-12-01 | Paper |
| Tight bounds on online checkpointing algorithms | 2021-07-28 | Paper |
| Tight Bounds on Online Checkpointing Algorithms | 2021-05-03 | Paper |
| An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-30 | Paper |
| Generic attacks on hash combiners | 2020-06-15 | Paper |
| Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem | 2020-06-15 | Paper |
| An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-15 | Paper |
| Linear equivalence of block ciphers with partial non-linear layers: application to LowMC | 2020-02-04 | Paper |
| Multi-target attacks on the Picnic signature scheme and related protocols | 2020-02-04 | Paper |
| Efficient dissection of bicomposite problems with cryptanalytic applications | 2019-11-27 | Paper |
| An algorithmic framework for the generalized birthday problem | 2019-06-27 | Paper |
| An improved affine equivalence algorithm for random permutations | 2018-07-09 | Paper |
| Improved generic attacks against hash-based MACs and HAIFA | 2018-01-05 | Paper |
| Time-memory tradeoff attacks on the MTP proof-of-work scheme | 2017-11-15 | Paper |
| WEM: a new family of white-box block ciphers based on the Even-Mansour construction | 2017-04-12 | Paper |
| Memory-Efficient Algorithms for Finding Needles in Haystacks | 2016-10-27 | Paper |
| Key recovery attacks on iterated Even-Mansour encryption schemes | 2016-10-13 | Paper |
| New attacks on the concatenation and XOR hash combiners | 2016-09-09 | Paper |
| Improved Differential Cryptanalysis of Round-Reduced Speck | 2016-04-13 | Paper |
| Optimized interpolation attacks on lowMC | 2016-03-23 | Paper |
| New attacks on Feistel structures with improved memory complexities | 2015-12-10 | Paper |
| Reflections on slide with a twist attacks | 2015-10-26 | Paper |
| Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE | 2015-09-30 | Paper |
| Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function | 2015-09-30 | Paper |
| Cryptanalysis of SP networks with partial non-linear layers | 2015-09-30 | Paper |
| Improved linear sieving techniques with applications to step-reduced LED-64 | 2015-09-18 | Paper |
| Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials | 2015-09-18 | Paper |
| Cryptanalysis of FIDES | 2015-09-18 | Paper |
| Improved top-down techniques in differential cryptanalysis | 2015-09-17 | Paper |
| Cryptanalysis of iterated Even-Mansour schemes with two keys | 2015-01-16 | Paper |
| Improved practical attacks on round-reduced Keccak | 2014-09-25 | Paper |
| Improved generic attacks against hash-based MACs and HAIFA | 2014-08-07 | Paper |
| Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 | 2013-12-10 | Paper |
| Applying cube attacks to stream ciphers in realistic scenarios | 2013-06-24 | Paper |
| New attacks on Keccak-224 and Keccak-256 | 2013-01-08 | Paper |
| Improved Attacks on Full GOST | 2013-01-08 | Paper |
| Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | 2012-09-25 | Paper |
| An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware | 2011-12-02 | Paper |
| An improved algebraic attack on Hamsi-256 | 2011-07-07 | Paper |
| Breaking Grain-128 with dynamic cube attacks | 2011-07-07 | Paper |
| Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium | 2009-08-11 | Paper |
| Cube Attacks on Tweakable Black Box Polynomials | 2009-05-12 | Paper |
| Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR | N/A | Paper |