| Publication | Date of Publication | Type |
|---|
On the design and security of RC2 Fast Software Encryption | 2018-05-09 | Paper |
Searching for compact algorithms: \texttt{CGEN} Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Non-linear approximations in linear cryptanalysis Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
On area, time, and the right trade-off Information Security and Privacy | 2012-09-07 | Paper |
On related-key attacks and KASUMI: the case of A5/3 Lecture Notes in Computer Science | 2011-12-16 | Paper |
The LED block cipher Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
The block cipher companion. Information Security and Cryptography | 2010-12-08 | Paper |
On unbiased linear approximations Information Security and Privacy | 2010-10-25 | Paper |
PRINTcipher: A Block Cipher for IC-Printing Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
The Intel AES instructions set and the SHA-3 candidates Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
The Cryptanalysis of Reduced-Round SMS4 Selected Areas in Cryptography | 2009-11-03 | Paper |
On Building Hash Functions from Multivariate Quadratic Equations Information Security and Privacy | 2009-03-06 | Paper |
Good Variants of HB + Are Hard to Find Financial Cryptography and Data Security | 2009-02-12 | Paper |
Hash Functions and RFID Tags: Mind the Gap Cryptographic Hardware and Embedded Systems – CHES 2008 | 2009-01-09 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
How to Encrypt with the LPN Problem Automata, Languages and Programming | 2008-08-19 | Paper |
Looking Back at a New Hash Function Information Security and Privacy | 2008-07-08 | Paper |
Correlated Keystreams in Moustique Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Combining Compression Functions and Block Cipher-Based Hash Functions Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
: Increasing the Security and Efficiency of Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
| On the state of the AES and cryptographic hashing | 2008-03-05 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
| Algebraic aspects of the advanced encryption standard. | 2006-08-29 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
| scientific article; zbMATH DE number 1942409 (Why is no real title available?) | 2003-06-30 | Paper |
Key-dependent S-boxes and differential cryptanalysis Designs, Codes and Cryptography | 2003-04-03 | Paper |
| scientific article; zbMATH DE number 1617919 (Why is no real title available?) | 2001-07-12 | Paper |
Fast block cipher proposal Fast Software Encryption | 2000-08-30 | Paper |
| scientific article; zbMATH DE number 1418294 (Why is no real title available?) | 2000-07-26 | Paper |
| scientific article; zbMATH DE number 1418240 (Why is no real title available?) | 2000-07-19 | Paper |
| scientific article; zbMATH DE number 1455103 (Why is no real title available?) | 2000-06-05 | Paper |
| scientific article; zbMATH DE number 1406764 (Why is no real title available?) | 2000-03-01 | Paper |
Storage efficient decoding for a class of binary de Bruijn sequences Discrete Mathematics | 1995-08-08 | Paper |
On evaluating the linear complexity of a sequence of least period \(2^ n\) Designs, Codes and Cryptography | 1994-09-04 | Paper |
Increasing the rate of output for m sequences Electronics Letters | 1992-06-28 | Paper |