| Publication | Date of Publication | Type |
|---|
| Multi-user security of the Elephant v2 authenticated encryption mode | 2024-10-14 | Paper |
| Generic security of the SAFE API and its applications | 2024-06-26 | Paper |
| The COLM Authenticated Encryption Scheme | 2024-04-21 | Paper |
| Revisiting the indifferentiability of the sum of permutations | 2024-02-02 | Paper |
| Security of truncated permutation without initial value | 2023-08-16 | Paper |
| Tight preimage resistance of the sponge construction | 2023-07-07 | Paper |
| The Relation Between CENC and NEMO | 2023-06-28 | Paper |
| Categorization of faulty nonce misuse resistant message authentication | 2023-05-12 | Paper |
| Beyond birthday bound secure fresh rekeying: application to authenticated encryption | 2023-03-21 | Paper |
| The summation-truncation hybrid: reusing discarded bits for free | 2022-11-09 | Paper |
| Collapseability of Tree Hashes | 2022-10-13 | Paper |
| Leakage resilient value comparison with application to message authentication | 2021-12-08 | Paper |
| On the resilience of Even-Mansour to invariant permutations | 2021-05-10 | Paper |
| Practical forgeries for ORANGE | 2020-08-04 | Paper |
| How to build pseudorandom functions from public random permutations | 2020-05-20 | Paper |
| Leakage resilience of the duplex construction | 2020-05-11 | Paper |
| Linking Stam's bounds with generalized truncation | 2020-01-28 | Paper |
| Beyond conventional security in sponge-based authenticated encryption modes | 2019-08-13 | Paper |
| Short variable length domain extenders with beyond birthday bound security | 2018-12-20 | Paper |
| Towards tight security of cascaded LRW2 | 2018-12-06 | Paper |
| Recipient privacy in online social networks (short paper) | 2018-10-24 | Paper |
| Damaging, simplifying, and salvaging p-OMD | 2018-10-18 | Paper |
| XOR of PRPs in a quantum world | 2018-09-12 | Paper |
| Connecting tweakable and multi-key blockcipher security | 2018-04-06 | Paper |
| Full-state keyed duplex with built-in multi-user support | 2018-03-08 | Paper |
| Analyzing multi-key security degradation | 2018-03-08 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4602284 | 2018-01-09 | Paper |
| Insuperability of the standard versus ideal model gap for tweakable blockcipher security | 2017-11-15 | Paper |
| Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory | 2017-10-27 | Paper |
| Optimal collision security in double block length hashing with single length key | 2017-04-13 | Paper |
| Weak Keys for AEZ, and the External Key Padding Attack | 2017-04-12 | Paper |
| XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees | 2016-11-30 | Paper |
| Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption | 2016-09-09 | Paper |
| Forgery and Subkey Recovery on CAESAR Candidate iFeed | 2016-05-19 | Paper |
| Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers | 2016-04-13 | Paper |
| On the Impact of Known-Key Attacks on Hash Functions | 2016-03-23 | Paper |
| Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption | 2016-03-23 | Paper |
| On the XOR of Multiple Random Permutations | 2016-03-10 | Paper |
| Provable Security of BLAKE with Non-ideal Compression Function | 2015-12-04 | Paper |
| Open problems in hash function security | 2015-10-26 | Paper |
| Two-permutation-based hashing with binary mixing | 2015-10-13 | Paper |
| COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse | 2015-09-18 | Paper |
| Optimally Secure Tweakable Blockciphers | 2015-09-18 | Paper |
| Towards Understanding the Known-Key Security of Block Ciphers | 2015-09-18 | Paper |
| Security of Keyed Sponge Constructions Using a Modular Proof Approach | 2015-09-18 | Paper |
| APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography | 2015-09-18 | Paper |
| Breaking and Fixing Cryptophia’s Short Combiner | 2015-02-10 | Paper |
| How to Securely Release Unverified Plaintext in Authenticated Encryption | 2015-01-16 | Paper |
| Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes | 2015-01-16 | Paper |
| The Security of Multiple Encryption in the Ideal Cipher Model | 2014-08-07 | Paper |
| On the collision and preimage security of MDC-4 in the ideal cipher model | 2014-08-01 | Paper |
| Indifferentiability of Double Length Compression Functions | 2014-01-17 | Paper |
| Parallelizable and Authenticated Online Ciphers | 2013-12-10 | Paper |
| On the Indifferentiability of Key-Alternating Ciphers | 2013-09-02 | Paper |
| Optimal Collision Security in Double Block Length Hashing with Single Length Key | 2013-03-19 | Paper |
| Hash Functions Based on Three Permutations: A Generic Security Analysis | 2012-09-25 | Paper |
| Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein | 2012-07-23 | Paper |
| Provable Chosen-Target-Forced-Midfix Preimage Resistance | 2012-06-08 | Paper |
| Increasing the flexibility of the herding attack | 2012-03-09 | Paper |
| Security Reductions of the Second Round SHA-3 Candidates | 2011-02-11 | Paper |
| Anonymous Credential Schemes with Encrypted Attributes | 2010-12-07 | Paper |
| On the Indifferentiability of the Grøstl Hash Function | 2010-09-10 | Paper |