| Publication | Date of Publication | Type |
|---|
| Multi-user security of the Elephant v2 authenticated encryption mode | 2024-10-14 | Paper |
| Generic security of the SAFE API and its applications | 2024-06-26 | Paper |
| The COLM Authenticated Encryption Scheme | 2024-04-21 | Paper |
| Revisiting the indifferentiability of the sum of permutations | 2024-02-02 | Paper |
| Security of truncated permutation without initial value | 2023-08-16 | Paper |
| Tight preimage resistance of the sponge construction | 2023-07-07 | Paper |
| The Relation Between CENC and NEMO | 2023-06-28 | Paper |
| Categorization of faulty nonce misuse resistant message authentication | 2023-05-12 | Paper |
| Beyond birthday bound secure fresh rekeying: application to authenticated encryption | 2023-03-21 | Paper |
| The summation-truncation hybrid: reusing discarded bits for free | 2022-11-09 | Paper |
| Collapseability of tree hashes | 2022-10-13 | Paper |
| Leakage resilient value comparison with application to message authentication | 2021-12-08 | Paper |
| On the resilience of Even-Mansour to invariant permutations | 2021-05-10 | Paper |
| Practical forgeries for ORANGE | 2020-08-04 | Paper |
| How to build pseudorandom functions from public random permutations | 2020-05-20 | Paper |
| Leakage resilience of the duplex construction | 2020-05-11 | Paper |
| Linking Stam's bounds with generalized truncation | 2020-01-28 | Paper |
| Beyond conventional security in sponge-based authenticated encryption modes | 2019-08-13 | Paper |
| Short variable length domain extenders with beyond birthday bound security | 2018-12-20 | Paper |
| Towards tight security of cascaded LRW2 | 2018-12-06 | Paper |
| Recipient privacy in online social networks (short paper) | 2018-10-24 | Paper |
| Damaging, simplifying, and salvaging p-OMD | 2018-10-18 | Paper |
| XOR of PRPs in a quantum world | 2018-09-12 | Paper |
| Connecting tweakable and multi-key blockcipher security | 2018-04-06 | Paper |
| Full-state keyed duplex with built-in multi-user support | 2018-03-08 | Paper |
| Analyzing multi-key security degradation | 2018-03-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4602284 | 2018-01-09 | Paper |
| Insuperability of the standard versus ideal model gap for tweakable blockcipher security | 2017-11-15 | Paper |
| Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory | 2017-10-27 | Paper |
| Optimal collision security in double block length hashing with single length key | 2017-04-13 | Paper |
| Weak keys for AEZ, and the external key padding attack | 2017-04-12 | Paper |
| XPX: generalized tweakable Even-Mansour with improved security guarantees | 2016-11-30 | Paper |
| Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption | 2016-09-09 | Paper |
| Forgery and subkey recovery on CAESAR candidate iFeed | 2016-05-19 | Paper |
| Chaskey: an efficient MAC algorithm for 32-bit microcontrollers | 2016-04-13 | Paper |
| On the impact of known-key attacks on hash functions | 2016-03-23 | Paper |
| Security of full-state keyed sponge and duplex: applications to authenticated encryption | 2016-03-23 | Paper |
| On the XOR of multiple random permutations | 2016-03-10 | Paper |
| Provable Security of BLAKE with Non-ideal Compression Function | 2015-12-04 | Paper |
| Open problems in hash function security | 2015-10-26 | Paper |
| Two-permutation-based hashing with binary mixing | 2015-10-13 | Paper |
| COBRA: a parallelizable authenticated online cipher without block cipher inverse | 2015-09-18 | Paper |
| Optimally secure tweakable blockciphers | 2015-09-18 | Paper |
| Towards Understanding the Known-Key Security of Block Ciphers | 2015-09-18 | Paper |
| Security of Keyed Sponge Constructions Using a Modular Proof Approach | 2015-09-18 | Paper |
| APE: authenticated permutation-based encryption for lightweight cryptography | 2015-09-18 | Paper |
| Breaking and Fixing Cryptophia’s Short Combiner | 2015-02-10 | Paper |
| How to securely release unverified plaintext in authenticated encryption | 2015-01-16 | Paper |
| Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes | 2015-01-16 | Paper |
| The security of multiple encryption in the ideal cipher model | 2014-08-07 | Paper |
| On the collision and preimage security of MDC-4 in the ideal cipher model | 2014-08-01 | Paper |
| Indifferentiability of double length compression functions | 2014-01-17 | Paper |
| Parallelizable and authenticated online ciphers | 2013-12-10 | Paper |
| On the indifferentiability of key-alternating ciphers | 2013-09-02 | Paper |
| Optimal collision security in double block length hashing with single length key | 2013-03-19 | Paper |
| Hash functions based on three permutations: a generic security analysis | 2012-09-25 | Paper |
| Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein | 2012-07-23 | Paper |
| Provable chosen-target-forced-midfix preimage resistance | 2012-06-08 | Paper |
| Increasing the flexibility of the herding attack | 2012-03-09 | Paper |
| Security reductions of the second round SHA-3 candidates | 2011-02-11 | Paper |
| Anonymous credential schemes with encrypted attributes | 2010-12-07 | Paper |
| On the indifferentiability of the Grøstl hash function | 2010-09-10 | Paper |