| Publication | Date of Publication | Type |
|---|
| Vectorial fast correlation attacks | 2026-03-31 | Paper |
Ridge estimation of covariance matrix from data in two classes. Applications of Mathematics | 2024-08-07 | Paper |
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V Designs, Codes and Cryptography | 2022-09-22 | Paper |
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G Designs, Codes and Cryptography | 2020-10-21 | Paper |
| Fault attacks on stream cipher Scream | 2018-12-07 | Paper |
| Combined cache timing attacks and template attacks on stream cipher MUGI | 2018-12-07 | Paper |
| Two generic methods of analyzing stream ciphers | 2018-10-18 | Paper |
| Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 | 2018-09-26 | Paper |
| Fast near collision attack on the Grain v1 stream cipher | 2018-07-09 | Paper |
Design and analysis of small-state grain-like stream ciphers Cryptography and Communications | 2018-05-28 | Paper |
Practical cryptanalysis of Bluetooth encryption with condition masking Journal of Cryptology | 2018-05-28 | Paper |
A guess-then-algebraic attack on LFSR-based stream ciphers with nonlinear filter Information and Communications Security | 2016-12-19 | Paper |
Faster algorithms for solving LPN Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Error-tolerant side-channel cube attack revisited Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Another tradeoff attack on sprout-like stream ciphers Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 Lecture Notes in Computer Science | 2015-12-10 | Paper |
Autocorrelation values of new generalized cyclotomic sequences of order six over \(\mathbb Z_{pq}\) Information Security and Cryptology | 2015-12-02 | Paper |
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks Lecture Notes in Computer Science | 2015-11-03 | Paper |
Near collision attack on the Grain v1 stream cipher Fast Software Encryption | 2015-09-18 | Paper |
Linear cryptanalysis of FASER128/256 and TriviA-ck Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Computing Walsh coefficients from the algebraic normal form of a Boolean function Cryptography and Communications | 2014-10-08 | Paper |
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets Information Security and Privacy | 2014-07-24 | Paper |
A new model for error-tolerant side-channel cube attacks Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract) Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Improved multi-pass fast correlation attacks with applications Science China Information Sciences | 2013-07-03 | Paper |
Cryptanalysis of helix and phelix revisited Information Security and Privacy | 2013-06-28 | Paper |
Improved key recovery attacks on reduced-round Salsa20 and ChaCha Lecture Notes in Computer Science | 2013-06-04 | Paper |
An improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators Information Security and Cryptology | 2013-05-28 | Paper |
Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G\(^{ \oplus }\) Applied Cryptography and Network Security | 2010-07-06 | Paper |
New cryptanalysis of irregularly decimated stream ciphers Selected Areas in Cryptography | 2009-12-09 | Paper |
An Improved Fast Correlation Attack on Stream Ciphers Selected Areas in Cryptography | 2009-11-03 | Paper |
New Guess-and-Determine Attack on the Self-Shrinking Generator Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Multi-pass Fast Correlation Attack on Stream Ciphers Selected Areas in Cryptography | 2007-11-29 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Security analysis of a new stream cipher Science in China. Series F | 2006-10-11 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Legendre Sequences and Modified Jacobi Sequences The International Series in Engineering and Computer Science | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 2202215 (Why is no real title available?) | 2005-09-05 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |