Publication | Date of Publication | Type |
---|
Compact lattice gadget and its applications to hash-and-sign signatures | 2024-02-06 | Paper |
Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks | 2024-02-02 | Paper |
Lattice-based cryptography: a survey | 2024-01-04 | Paper |
Meet-in-the-middle preimage attacks on sponge-based hashing | 2023-12-08 | Paper |
Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} | 2023-08-25 | Paper |
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials | 2023-05-12 | Paper |
Preimage attacks on 4-round Keccak by solving multivariate quadratic systems | 2022-12-07 | Paper |
Differential-algebraic cryptanalysis of reduced-round of Serpent-256 | 2022-10-28 | Paper |
On an attack on RSA with small CRT-exponents | 2022-10-28 | Paper |
Key guessing strategies for linear key-schedule algorithms in rectangle attacks | 2022-08-30 | Paper |
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks | 2022-04-22 | Paper |
Computational aspects of lattices and their cryptographic applications | 2022-03-21 | Paper |
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing | 2021-12-08 | Paper |
Quantum attacks on some Feistel block ciphers | 2020-05-21 | Paper |
MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes | 2019-05-24 | Paper |
A key-recovery attack on 855-round Trivium | 2018-09-26 | Paper |
Conditional cube attack on round-reduced River Keyak | 2018-05-24 | Paper |
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques | 2018-05-09 | Paper |
Improved conditional cube attacks on Keccak keyed modes with MILP method | 2018-04-06 | Paper |
Provably Secure NTRU Instances over Prime Cyclotomic Rings | 2017-06-13 | Paper |
Conditional Cube Attack on Reduced-Round Keccak Sponge Function | 2017-06-13 | Paper |
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers | 2017-05-05 | Paper |
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques | 2016-09-02 | Paper |
Improved Impossible Differential Attack on Reduced-Round LBlock | 2016-05-19 | Paper |
Improved Attacks on Reduced-Round Camellia-128/192/256 | 2016-03-02 | Paper |
Finding Shortest Lattice Vectors in the Presence of Gaps | 2016-03-02 | Paper |
Improved Cryptanalysis of the Block Cipher KASUMI | 2015-12-04 | Paper |
The Boomerang Attacks on the Round-Reduced Skein-512 | 2015-12-04 | Paper |
Mathematical Foundations of Public Key Cryptography | 2015-10-07 | Paper |
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 | 2015-09-18 | Paper |
Improved Single-Key Attacks on 9-Round AES-192/256 | 2015-09-18 | Paper |
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia | 2015-09-18 | Paper |
A note on BDD problems with \(\lambda_2\)-gap | 2015-06-25 | Paper |
Cryptanalysis of GOST R hash function | 2014-08-28 | Paper |
Fast correlation attack on stream cipher ABC v3 | 2014-07-21 | Paper |
Improved Boomerang Attacks on SM3 | 2013-06-28 | Paper |
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia | 2013-01-08 | Paper |
Public key encryption without random oracle made truly practical | 2012-10-19 | Paper |
On the equivalent keys in multivariate cryptosystems | 2012-10-05 | Paper |
Public Key Encryption for the Forgetful | 2012-06-08 | Paper |
Practical Attack on the Full MMB Block Cipher | 2012-06-08 | Paper |
On the correlation of pseudorandom binary sequences using additive characters | 2011-12-20 | Paper |
Pseudo-Cryptanalysis of Luffa | 2011-07-29 | Paper |
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 | 2011-07-07 | Paper |
Cryptanalysis of the Compression Function of SIMD | 2011-07-07 | Paper |
Certificateless encryption scheme secure in standard model | 2010-11-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3653719 | 2009-12-28 | Paper |
Large families of elliptic curve pseudorandom binary sequences | 2009-12-08 | Paper |
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 | 2009-11-03 | Paper |
New Birthday Attacks on Some MACs Based on Block Ciphers | 2009-10-20 | Paper |
New Distinguishing Attack on MAC Using Secret-Prefix Method | 2009-08-11 | Paper |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 | 2009-06-25 | Paper |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC | 2009-05-12 | Paper |
Cryptanalysis of the Full HAVAL with 4 and 5 Passes | 2009-04-02 | Paper |
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL | 2008-05-06 | Paper |
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 | 2008-05-06 | Paper |
Cryptanalysis of the Hash Functions MD4 and RIPEMD | 2008-05-06 | Paper |
How to Break MD5 and Other Hash Functions | 2008-05-06 | Paper |
Efficient Collision Search Attacks on SHA-0 | 2008-03-17 | Paper |
Finding Collisions in the Full SHA-1 | 2008-03-17 | Paper |
An attack on hash function HAVAL-128 | 2007-02-20 | Paper |
Cryptology and Network Security | 2006-11-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950043 | 2001-10-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4025542 | 1993-02-18 | Paper |