Publication | Date of Publication | Type |
---|
Coefficient grouping for complex affine layers | 2024-02-02 | Paper |
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP | 2023-12-08 | Paper |
Coefficient grouping: breaking Chaghri and more | 2023-12-08 | Paper |
Algebraic meet-in-the-middle attack on LowMC | 2023-08-25 | Paper |
Algebraic attacks on Rasta and Dasta using low-degree equations | 2023-05-12 | Paper |
Automatic verification of differential characteristics: application to reduced Gimli | 2022-12-07 | Paper |
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021 | 2022-10-11 | Paper |
The inverse of \(\chi\) and its applications to Rasta-like ciphers | 2022-10-06 | Paper |
Grain-128AEADv2: strengthening the initialization against key reconstruction | 2022-06-29 | Paper |
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques | 2022-04-22 | Paper |
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD | 2021-12-01 | Paper |
Modeling for three-subset division property without unknown subset | 2021-08-10 | Paper |
On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet | 2020-07-21 | Paper |
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT | 2020-05-21 | Paper |
Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 | 2020-05-12 | Paper |
Cryptanalysis of ForkAES | 2020-01-30 | Paper |
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly | 2020-01-28 | Paper |
A New Cube Attack on MORUS by Using Division Property | 2020-01-28 | Paper |
New cube distinguishers on NFSR-based stream ciphers | 2020-01-09 | Paper |
An AEAD variant of the Grain stream cipher | 2019-10-14 | Paper |
Cube Attacks on Non-Blackbox Polynomials Based on Division Property | 2019-03-07 | Paper |
Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 | 2018-09-26 | Paper |
A key-recovery attack on 855-round Trivium | 2018-09-26 | Paper |
Improved division property based cube attacks exploiting algebraic properties of superpoly | 2018-09-12 | Paper |
Fast near collision attack on the Grain v1 stream cipher | 2018-07-09 | Paper |
Design and analysis of small-state grain-like stream ciphers | 2018-05-28 | Paper |
Cube attacks on non-blackbox polynomials based on division property | 2017-10-27 | Paper |
Truncated differential based known-key attacks on round-reduced SIMON | 2017-04-13 | Paper |
Optimized Interpolation Attacks on LowMC | 2016-03-23 | Paper |
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 | 2015-12-10 | Paper |
Improved Differential Attacks on RC5 | 2015-11-11 | Paper |
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA | 2015-09-18 | Paper |
The hash function \texttt{BLAKE} | 2014-12-15 | Paper |
Differential Biases in Reduced-Round Keccak | 2014-06-24 | Paper |
Quark: a lightweight hash | 2013-06-27 | Paper |
High order differential attacks on stream ciphers | 2013-06-24 | Paper |
Synthetic linear analysis with applications to CubeHash and Rabbit | 2013-06-24 | Paper |
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 | 2013-06-07 | Paper |
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit | 2012-11-01 | Paper |
Stream Ciphers, a Perspective | 2012-07-23 | Paper |
Conditional Differential Cryptanalysis of Trivium and KATAN | 2012-06-08 | Paper |
Practical Analysis of Reduced-Round Keccak | 2011-12-16 | Paper |
Fast Correlation Attacks: Methods and Countermeasures | 2011-07-07 | Paper |
Cryptanalysis of the Knapsack Generator | 2011-07-07 | Paper |
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems | 2010-12-07 | Paper |
Quark: A Lightweight Hash | 2010-08-17 | Paper |
Cryptanalysis of ESSENCE | 2010-07-13 | Paper |
Differential and Invertibility Properties of BLAKE | 2010-07-13 | Paper |
Improved Linear Differential Attacks on CubeHash | 2010-05-04 | Paper |
Some remarks on FCSRs and implications for stream ciphers | 2010-02-05 | Paper |
Improved Cryptanalysis of Skein | 2009-12-15 | Paper |
Linearization Framework for Collision Attacks: Application to CubeHash and MD6 | 2009-12-15 | Paper |
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 | 2009-11-03 | Paper |
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium | 2009-08-11 | Paper |
Inside the Hypercube | 2009-06-25 | Paper |
Cryptanalysis of Achterbahn | 2009-04-02 | Paper |
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher | 2009-03-06 | Paper |
On Reconstruction of RC4 Keys from Internal States | 2009-01-22 | Paper |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers | 2009-01-22 | Paper |
The Hash Function Family LAKE | 2008-09-18 | Paper |
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba | 2008-09-18 | Paper |
Algebraic Immunity of S-Boxes and Augmented Functions | 2008-09-16 | Paper |
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers | 2008-06-13 | Paper |
Analysis of Multivariate Hash Functions | 2008-05-06 | Paper |
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 | 2008-04-11 | Paper |
Reduced Complexity Attacks on the Alternating Step Generator | 2008-03-25 | Paper |
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption | 2008-03-17 | Paper |
Fault Attacks on Combiners with Memory | 2007-11-15 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks | 2007-09-24 | Paper |
Progress in Cryptology – Mycrypt 2005 | 2006-10-05 | Paper |
Analysis of SSC2 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3043940 | 2004-08-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434884 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434885 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4537985 | 2002-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250773 | 2000-04-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q4934706 | 2000-01-31 | Paper |
Analysis Methods for (Alleged) RC4 | 1999-06-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4365740 | 1998-02-11 | Paper |
Cryptography and elliptic curves | 1997-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4857247 | 1996-07-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4318707 | 1995-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279606 | 1994-05-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4036872 | 1993-05-18 | Paper |
Analysis of Pseudo Random Sequences Generated by Cellular Automata | 1993-05-18 | Paper |
Correlation properties of combiners with memory in stream ciphers | 1992-06-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q5202622 | 1990-01-01 | Paper |
Fast correlation attacks on certain stream ciphers | 1989-01-01 | Paper |
Some topological properties of Kaehler manifolds and homogeneous spaces | 1983-01-01 | Paper |
On Fibre Inclusions and Kahler Manifolds | 1983-01-01 | Paper |
Rational universal fibrations and flag manifolds | 1982-01-01 | Paper |
HOMOTOPY GROUPS OF ACYCLIC SPACES | 1981-01-01 | Paper |
Minimal models for non-nilpotent spaces | 1980-01-01 | Paper |
Complex and real K-theory and localization | 1979-01-01 | Paper |
Acyclic maps and knot complements | 1979-01-01 | Paper |
Homotopy nilpotency and localization | 1978-01-01 | Paper |
PULLBACK THEOREMS AND PHANTOM MAPS | 1978-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4197751 | 1978-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4112637 | 1976-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4074107 | 1975-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4082041 | 1975-01-01 | Paper |