| Publication | Date of Publication | Type |
|---|
\textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions | 2024-11-12 | Paper |
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing Journal of Cryptology | 2021-08-10 | Paper |
Differential cryptanalysis of SipHash Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Malicious hashing: Eve's variant of SHA-1 Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Cryptanalysis of Ascon Lecture Notes in Computer Science | 2016-03-02 | Paper |
Branching heuristics in differential collision search with applications to SHA-512 Fast Software Encryption | 2015-09-18 | Paper |
Collision attack on 5 rounds of Grøstl Fast Software Encryption | 2015-09-18 | Paper |
Key recovery attacks on recent authenticated ciphers Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
The rebound attack and subspace distinguishers: application to Whirlpool Journal of Cryptology | 2015-05-12 | Paper |
Differential Cryptanalysis of Keccak Variants Cryptography and Coding | 2014-01-17 | Paper |
Improved Cryptanalysis of Reduced RIPEMD-160 Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Fast software encryption attacks on AES Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Improving local collisions: new attacks on reduced SHA-256 Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Finding collisions for round-reduced SM3 Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implemenations for Grøstl Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
Collision attacks on the reduced dual-stream hash function RIPEMD-128 Fast Software Encryption | 2013-01-08 | Paper |
Cryptanalysis of round-reduced HAS-160 Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Improved analysis of ECHO-256 Selected Areas in Cryptography | 2012-06-08 | Paper |
Secure hardware implementation of nonlinear functions in the presence of glitches Journal of Cryptology | 2012-01-18 | Paper |
Finding SHA-2 characteristics: searching through a minefield of contradictions Lecture Notes in Computer Science | 2011-12-02 | Paper |
Cryptanalysis of Luffa v2 components Selected Areas in Cryptography | 2011-03-15 | Paper |
Subspace distinguisher for 5/8 rounds of the ECHO-256 hash function Selected Areas in Cryptography | 2011-03-15 | Paper |
Distinguishers for the compression function and output transformation of Hamsi-256 Information Security and Privacy | 2010-10-25 | Paper |
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Rebound Attacks on the Reduced Grøstl Hash Function Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Rebound attack on the full Lane compression function Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Rebound distinguishers: results on the full Whirlpool compression function Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
MD5 is weaker than weak: attacks on concatenated combiners Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher Selected Areas in Cryptography | 2009-12-09 | Paper |
Practical collisions for SHAMATA-256 Selected Areas in Cryptography | 2009-12-09 | Paper |
On Free-Start Collisions and Collisions for TIB3 Lecture Notes in Computer Science | 2009-09-29 | Paper |
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl Fast Software Encryption | 2009-08-11 | Paper |
Searching for Differential Paths in MD4 Fast Software Encryption | 2009-04-02 | Paper |
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches Information Security and Cryptology – ICISC 2008 | 2009-03-24 | Paper |
Using Normal Bases for Compact Hardware Implementations of the AES S-Box Lecture Notes in Computer Science | 2008-11-20 | Paper |
Collisions for Round-Reduced LAKE Information Security and Privacy | 2008-07-08 | Paper |