| Publication | Date of Publication | Type |
|---|
| Crypto dictionary. 500 tasty tidbits for the curious cryptographer | 2021-11-26 | Paper |
| Improving stateless hash-based signatures | 2020-01-21 | Paper |
| Serious cryptography. A practical introduction to modern encryption. With a foreword by Matthew D. Green | 2019-08-02 | Paper |
Malicious hashing: Eve's variant of SHA-1 Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Analysis of NORX: investigating differential and rotational properties Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
NORX: Parallel and scalable AEAD Computer Security - ESORICS 2014 | 2015-07-27 | Paper |
The hash function \texttt{BLAKE} Information Security and Cryptography | 2014-12-15 | Paper |
SipHash: a fast short-input PRF Lecture Notes in Computer Science | 2014-08-20 | Paper |
BLAKE2: simpler, smaller, fast as MD5 Applied Cryptography and Network Security | 2014-01-24 | Paper |
Quark: a lightweight hash Journal of Cryptology | 2013-06-27 | Paper |
On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers Information Processing Letters | 2013-03-28 | Paper |
Practical attack on 8 rounds of the lightweight block cipher KLEIN Lecture Notes in Computer Science | 2011-12-16 | Paper |
Cryptanalysis of the ESSENCE family of hash functions Information Security and Cryptology | 2010-11-23 | Paper |
Distinguishers for the compression function and output transformation of Hamsi-256 Information Security and Privacy | 2010-10-25 | Paper |
Quark: a lightweight hash Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Differential and invertibility properties of BLAKE Fast Software Encryption | 2010-07-13 | Paper |
Cryptanalysis of ESSENCE Fast Software Encryption | 2010-07-13 | Paper |
Improved cryptanalysis of Skein Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Cryptanalysis of dynamic SHA(2) Selected Areas in Cryptography | 2009-12-09 | Paper |
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 Selected Areas in Cryptography | 2009-11-03 | Paper |
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium Fast Software Encryption | 2009-08-11 | Paper |
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) Fast Software Encryption | 2009-08-11 | Paper |
Cryptanalysis of Vortex Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Inside the Hypercube Information Security and Privacy | 2009-06-25 | Paper |
Cryptanalysis of a Hash Function Based on Norm Form Equations Cryptologia | 2009-05-22 | Paper |
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher Information Security and Privacy | 2009-03-06 | Paper |
Faster Multicollisions Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Fast Software Encryption | 2008-09-18 | Paper |
The Hash Function Family LAKE Fast Software Encryption | 2008-09-18 | Paper |
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Analysis of Multivariate Hash Functions Lecture Notes in Computer Science | 2008-05-06 | Paper |