| Publication | Date of Publication | Type |
|---|
| Preimage attacks on reduced-round \textsc{Ascon-Xof} | 2024-08-13 | Paper |
| Enhancing the related-key security of \textsf{PIPO} through new key schedules | 2024-05-31 | Paper |
| Global existence of smooth solutions for the compressible viscous fluid flow with radiation in \(\mathbb{R}^3\). | 2024-01-18 | Paper |
| Global existence of smooth solutions for the diffusion approximation model of general gas in radiation hydrodynamics | 2023-11-07 | Paper |
| See-in-the-middle attacks on blockciphers ARIA and DEFAULT | 2023-08-21 | Paper |
| Improved see-in-the-middle attacks on AES | 2022-12-07 | Paper |
| Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions | 2022-12-05 | Paper |
| Stability of non-degenerate stationary solution in inflow problem for a 1-D radiation hydrodynamics model | 2022-11-17 | Paper |
| Differential uniformity and linearity of S-boxes by multiplicative complexity | 2022-07-15 | Paper |
| \textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations | 2022-03-24 | Paper |
| Stationary solutions of outflow problem for full compressible Navier-Stokes-Poisson system: existence, stability and convergence rate | 2021-12-08 | Paper |
| Non-degenerate stationary solution for outflow problem on the 1-D viscous heat-conducting gas with radiation | 2021-05-03 | Paper |
| Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis | 2017-07-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2973463 | 2017-04-03 | Paper |
| Higher order eTCR hash functions | 2016-07-06 | Paper |
| The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher | 2014-08-20 | Paper |
| The higher-order meet-in-the-middle attack and its application to the Camellia block cipher | 2014-03-13 | Paper |
| Asymptotic behavior of rarefaction waves for a model system of a radiating gas | 2013-09-26 | Paper |
| Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher | 2011-07-14 | Paper |
| Notions and relations for RKA-secure permutation and function families | 2011-06-03 | Paper |
| DES with any reduced masked rounds is not secure against side-channel attacks | 2010-11-08 | Paper |
| Nonlinear stability of strong rarefaction waves for the generalized KdV-Burgers-Kuramoto equation with large initial perturbation | 2010-10-14 | Paper |
| Impossible differential cryptanalysis using matrix method | 2010-04-27 | Paper |
| Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis | 2009-02-10 | Paper |
| New Impossible Differential Attacks on AES | 2009-01-22 | Paper |
| Convergence rates of solutions toward boundary layer solutions for generalized Benjamin-Bona-Mahony-Burgers equations in the half-space | 2008-12-12 | Paper |
| On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) | 2008-11-27 | Paper |
| Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b | 2008-11-27 | Paper |
| Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL | 2008-09-18 | Paper |
| Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 | 2008-09-16 | Paper |
| HIGHT: A New Block Cipher Suitable for Low-Resource Device | 2008-08-29 | Paper |
| Related-Key Rectangle Attack on 42-Round SHACAL-2 | 2008-06-17 | Paper |
| Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 | 2008-04-24 | Paper |
| Differential and Rectangle Attacks on Reduced-Round SHACAL-1 | 2008-04-11 | Paper |
| Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
| Related-Key Rectangle Attack on the Full SHACAL-1 | 2007-11-29 | Paper |
| Progress in Cryptology - INDOCRYPT 2003 | 2007-11-29 | Paper |
| Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant | 2007-09-07 | Paper |
| Cryptography and Coding | 2006-11-01 | Paper |
| Information and Communications Security | 2006-10-24 | Paper |
| Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
| Fast Software Encryption | 2006-06-22 | Paper |
| Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Information Security and Privacy | 2005-09-07 | Paper |
| Amplified Boomerang Attack against Reduced-Round SHACAL | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4527872 | 2001-08-20 | Paper |
| The large-time behavior of solutions for the system of nonisentopic gas dynamics with damping. | 2001-06-25 | Paper |
| Convergence rates of solutions to initial boundary value problem for one dimensional nonisentropic gas dynamic system with damping. | 2001-01-01 | Paper |