| Publication | Date of Publication | Type |
|---|
| Time-space lower bounds for bounded-error computation in the random-query model | 2024-11-28 | Paper |
| Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis | 2024-11-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6126253 | 2024-04-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6147408 | 2024-01-15 | Paper |
| On differential privacy and adaptive data analysis with bounded space | 2023-12-12 | Paper |
| Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation | 2023-12-08 | Paper |
| Distributed Merkle's puzzles | 2023-04-13 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 | 2022-08-30 | Paper |
| On the streaming indistinguishability of a random permutation and a random function | 2022-03-23 | Paper |
| Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) | 2021-12-08 | Paper |
| Tight time-space lower bounds for finding multiple collision pairs and their applications | 2021-12-01 | Paper |
| Tight Bounds on Online Checkpointing Algorithms | 2021-07-28 | Paper |
| Tight Bounds on Online Checkpointing Algorithms | 2021-05-03 | Paper |
| An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-30 | Paper |
| Generic attacks on hash combiners | 2020-06-15 | Paper |
| Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem | 2020-06-15 | Paper |
| An optimal distributed discrete log protocol with applications to homomorphic secret sharing | 2020-06-15 | Paper |
| Linear equivalence of block ciphers with partial non-linear layers: application to LowMC | 2020-02-04 | Paper |
| Multi-target attacks on the picnic signature scheme and related protocols | 2020-02-04 | Paper |
| Efficient dissection of bicomposite problems with cryptanalytic applications | 2019-11-27 | Paper |
| An algorithmic framework for the generalized birthday problem | 2019-06-27 | Paper |
| An improved affine equivalence algorithm for random permutations | 2018-07-09 | Paper |
| Improved generic attacks against hash-based MACs and HAIFA | 2018-01-05 | Paper |
| Time-memory tradeoff attacks on the MTP proof-of-work scheme | 2017-11-15 | Paper |
| WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction | 2017-04-12 | Paper |
| Memory-Efficient Algorithms for Finding Needles in Haystacks | 2016-10-27 | Paper |
| Key recovery attacks on iterated Even-Mansour encryption schemes | 2016-10-13 | Paper |
| New Attacks on the Concatenation and XOR Hash Combiners | 2016-09-09 | Paper |
| Improved Differential Cryptanalysis of Round-Reduced Speck | 2016-04-13 | Paper |
| Optimized Interpolation Attacks on LowMC | 2016-03-23 | Paper |
| New Attacks on Feistel Structures with Improved Memory Complexities | 2015-12-10 | Paper |
| Reflections on slide with a twist attacks | 2015-10-26 | Paper |
| Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE | 2015-09-30 | Paper |
| Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function | 2015-09-30 | Paper |
| Cryptanalysis of SP Networks with Partial Non-Linear Layers | 2015-09-30 | Paper |
| Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64 | 2015-09-18 | Paper |
| Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials | 2015-09-18 | Paper |
| Cryptanalysis of FIDES | 2015-09-18 | Paper |
| Improved Top-Down Techniques in Differential Cryptanalysis | 2015-09-17 | Paper |
| Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys | 2015-01-16 | Paper |
| Improved practical attacks on round-reduced Keccak | 2014-09-25 | Paper |
| Improved Generic Attacks against Hash-Based MACs and HAIFA | 2014-08-07 | Paper |
| Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 | 2013-12-10 | Paper |
| Applying cube attacks to stream ciphers in realistic scenarios | 2013-06-24 | Paper |
| New Attacks on Keccak-224 and Keccak-256 | 2013-01-08 | Paper |
| Improved Attacks on Full GOST | 2013-01-08 | Paper |
| Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | 2012-09-25 | Paper |
| An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware | 2011-12-02 | Paper |
| An Improved Algebraic Attack on Hamsi-256 | 2011-07-07 | Paper |
| Breaking Grain-128 with Dynamic Cube Attacks | 2011-07-07 | Paper |
| Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium | 2009-08-11 | Paper |
| Cube Attacks on Tweakable Black Box Polynomials | 2009-05-12 | Paper |
| Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR | N/A | Paper |