| Publication | Date of Publication | Type |
|---|
| Ridge estimation of covariance matrix from data in two classes. | 2024-08-07 | Paper |
| Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V | 2022-09-22 | Paper |
| Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G | 2020-10-21 | Paper |
| Fault attacks on stream cipher Scream | 2018-12-07 | Paper |
| Combined cache timing attacks and template attacks on stream cipher MUGI | 2018-12-07 | Paper |
| Two generic methods of analyzing stream ciphers | 2018-10-18 | Paper |
| Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 | 2018-09-26 | Paper |
| Fast near collision attack on the Grain v1 stream cipher | 2018-07-09 | Paper |
| Design and analysis of small-state grain-like stream ciphers | 2018-05-28 | Paper |
| Practical cryptanalysis of Bluetooth encryption with condition masking | 2018-05-28 | Paper |
| A Guess-Then-Algebraic Attack on LFSR-Based Stream Ciphers with Nonlinear Filter | 2016-12-19 | Paper |
| Faster Algorithms for Solving LPN | 2016-09-09 | Paper |
| Error-Tolerant Side-Channel Cube Attack Revisited | 2016-04-13 | Paper |
| Another Tradeoff Attack on Sprout-Like Stream Ciphers | 2016-03-23 | Paper |
| Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 | 2015-12-10 | Paper |
| Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Six Over $$Z_{pq}$$ | 2015-12-02 | Paper |
| Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks | 2015-11-03 | Paper |
| Near Collision Attack on the Grain v1 Stream Cipher | 2015-09-18 | Paper |
| Linear Cryptanalysis of FASER128/256 and TriviA-ck | 2015-09-10 | Paper |
| Computing Walsh coefficients from the algebraic normal form of a Boolean function | 2014-10-08 | Paper |
| Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets | 2014-07-24 | Paper |
| A New Model for Error-Tolerant Side-Channel Cube Attacks | 2013-10-10 | Paper |
| Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking | 2013-09-02 | Paper |
| Improved multi-pass fast correlation attacks with applications | 2013-07-03 | Paper |
| Cryptanalysis of Helix and Phelix Revisited | 2013-06-28 | Paper |
| Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha | 2013-06-04 | Paper |
| An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators | 2013-05-28 | Paper |
| Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G ⊕ | 2010-07-06 | Paper |
| New Cryptanalysis of Irregularly Decimated Stream Ciphers | 2009-12-09 | Paper |
| An Improved Fast Correlation Attack on Stream Ciphers | 2009-11-03 | Paper |
| New Guess-and-Determine Attack on the Self-Shrinking Generator | 2008-04-24 | Paper |
| Multi-pass Fast Correlation Attack on Stream Ciphers | 2007-11-29 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Security analysis of a new stream cipher | 2006-10-11 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
| Legendre Sequences and Modified Jacobi Sequences | 2005-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5314426 | 2005-09-05 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| Applied Cryptography and Network Security | 2005-06-13 | Paper |