| Publication | Date of Publication | Type |
|---|
| Related-key differential cryptanalysis of full round \texttt{CRAFT} | 2024-03-12 | Paper |
| On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers | 2023-04-13 | Paper |
| Integral Cryptanalysis of Reduced-Round Tweakable TWINE | 2023-03-22 | Paper |
Impossible differential cryptanalysis of reduced-round tweakable TWINE Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
| Publicly verifiable and secrecy preserving periodic auctions | 2022-06-01 | Paper |
| On MILP-based automatic search for differential trails through modular additions with application to Bel-T | 2020-05-06 | Paper |
| Integral attacks on round-reduced Bel-T-256 | 2019-02-20 | Paper |
| Differential fault analysis of streebog | 2018-12-07 | Paper |
| Truncated and multiple differential cryptanalysis of reduced round Midori128 | 2018-10-18 | Paper |
| Improved linear cryptanalysis of round-reduced ARIA | 2018-10-18 | Paper |
| Improved meet-in-the-middle attacks on reduced round Kuznyechik | 2018-06-15 | Paper |
| Multidimensional zero-correlation linear cryptanalysis of reduced round SPARX-128 | 2018-04-26 | Paper |
A Comment on “Cryptographic Applications of Brahmagupta–Bhãskara Equation” IEEE Transactions on Circuits and Systems I: Regular Papers | 2017-11-20 | Paper |
Impossible differential attack on reduced round SPARX-64/128 Progress in Cryptology - AFRICACRYPT 2017 | 2017-08-04 | Paper |
Impossible differential cryptanalysis of reduced-round \texttt{SKINNY} Progress in Cryptology - AFRICACRYPT 2017 | 2017-08-04 | Paper |
Meet-in-the-middle attacks on reduced round Piccolo Lecture Notes in Computer Science | 2016-02-22 | Paper |
Cryptanalysis of the loiss stream cipher Selected Areas in Cryptography | 2015-12-04 | Paper |
Boomerang and slide-rotational analysis of the SM3 hash function Selected Areas in Cryptography | 2015-12-04 | Paper |
Generalized MitM attacks on full TWINE Information Processing Letters | 2015-12-01 | Paper |
Second preimage analysis of Whirlwind Information Security and Cryptology | 2015-11-25 | Paper |
Rebound attacks on Stribog Information Security and Cryptology -- ICISC 2013 | 2015-10-16 | Paper |
A higher order key partitioning attack with application to LBlock Lecture Notes in Computer Science | 2015-09-21 | Paper |
Impossible differential properties of reduced round Streebog Lecture Notes in Computer Science | 2015-09-21 | Paper |
Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock Lecture Notes in Computer Science | 2015-09-18 | Paper |
Meet-in-the-middle attacks on reduced-round Hierocrypt-3 Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Cryptanalysis of Álvarez et al. key exchange scheme Information Sciences | 2014-08-01 | Paper |
Preimage attacks on reduced-round Stribog Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Integral distinguishers for reduced-round Stribog Information Processing Letters | 2014-04-30 | Paper |
Second order collision for the 42-step reduced DHA-256 hash function Information Processing Letters | 2014-04-14 | Paper |
A solution form of a class of higher-order rational difference equations Journal of the Egyptian Mathematical Society | 2014-01-13 | Paper |
A Heuristic for Finding Compatible Differential Paths with Application to HAS-160 Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Fault analysis of the NTRUSign digital signature scheme Cryptography and Communications | 2013-04-23 | Paper |
Cryptanalysis of a key exchange protocol based on the endomorphisms ring \(\mathrm{End}(\mathbb Z_p\times\mathbb Z_{p^2})\) Applicable Algebra in Engineering, Communication and Computing | 2012-12-13 | Paper |
On the Sosemanuk related key-IV sets Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
Cryptanalysis of a quadratic knapsack cryptosystem Computers & Mathematics with Applications | 2011-07-21 | Paper |
Differential fault analysis of Sosemanuk Lecture Notes in Computer Science | 2011-06-29 | Paper |
Differential fault analysis of HC-128 Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
On the structural weakness of the GGHN stream cipher Cryptography and Communications | 2010-04-12 | Paper |
Cryptanalysis of Boolean permutation-based key escrow scheme Computers and Electrical Engineering | 2010-04-07 | Paper |
Differential fault analysis of Rabbit Selected Areas in Cryptography | 2009-12-09 | Paper |
A new distinguishing and key recovery attack on NGG stream cipher Cryptography and Communications | 2009-10-26 | Paper |
Cryptanalysis of a knapsack-based probabilistic encryption scheme Information Sciences | 2009-10-01 | Paper |
On the existence of (9,3,5,240) resilient functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On some probabilistic approximations for AES-like S-boxes Discrete Mathematics | 2006-09-14 | Paper |
On linear complexity of sequences over \(\text{GF}(2^n)\) Theoretical Computer Science | 2006-03-24 | Paper |
Affine equivalence in the AES round function Discrete Applied Mathematics | 2005-08-17 | Paper |
Cryptographic properties of the Welch-Gong transformation sequence generators IEEE Transactions on Information Theory | 2005-05-11 | Paper |
| scientific article; zbMATH DE number 2085194 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 1857528 (Why is no real title available?) | 2003-05-19 | Paper |
| scientific article; zbMATH DE number 1808211 (Why is no real title available?) | 2002-12-03 | Paper |
| scientific article; zbMATH DE number 1759265 (Why is no real title available?) | 2002-11-24 | Paper |
| scientific article; zbMATH DE number 1808247 (Why is no real title available?) | 2002-09-26 | Paper |
| scientific article; zbMATH DE number 1689009 (Why is no real title available?) | 2002-01-09 | Paper |
Information leakage of a randomly selected boolean function Information Theory and Applications II | 1998-11-17 | Paper |
Comment on ``Bounds on the number of functions satisfying the Strict Avalanche Criterion Information Processing Letters | 1997-02-28 | Paper |
Resistance of balanced s-boxes to linear and differential cryptanalysis Information Processing Letters | 1997-02-27 | Paper |