| Publication | Date of Publication | Type |
|---|
| On the post-quantum security of classical authenticated encryption schemes | 2024-02-02 | Paper |
| QCB is blindly unforgeable | 2023-10-04 | Paper |
| Implicit key-stretching security of encryption schemes | 2023-08-21 | Paper |
| Pholkos -- efficient large-state tweakable block ciphers from the AES round function | 2022-07-06 | Paper |
| Cryptanalysis of ForkAES | 2020-01-30 | Paper |
| Attacking triple encryption | 2018-05-09 | Paper |
| On the security of remotely keyed encryption | 2018-05-09 | Paper |
| RIV for robust authenticated encryption | 2018-05-09 | Paper |
| How traveling salespersons prove their identity | 2018-03-21 | Paper |
| New second preimage attacks on dithered hash functions with low memory complexity | 2018-02-16 | Paper |
| \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher | 2018-01-29 | Paper |
| Faster Luby-Rackoff ciphers | 2017-11-15 | Paper |
| Reforgeability of authenticated encryption schemes | 2017-08-25 | Paper |
| Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch | 2016-09-02 | Paper |
| Hash functions from defective ideal ciphers | 2016-03-02 | Paper |
| Pipelineable on-line encryption | 2015-09-18 | Paper |
| A framework for automated independent-biclique cryptanalysis | 2015-09-18 | Paper |
| Differential cryptanalysis of round-reduced \textsc{Simon} and \textsc{Speck} | 2015-09-18 | Paper |
| Attacks and security proofs of EAX-prime | 2015-09-18 | Paper |
| Memory-demanding password scrambling | 2015-01-06 | Paper |
| Counter-\(b\)DM: a provably secure family of multi-block-length compression functions | 2014-06-24 | Paper |
| Improved authenticity bound of EAX, and refinements | 2013-10-23 | Paper |
| McOE: a family of almost foolproof on-line authenticated encryption schemes | 2013-01-08 | Paper |
| \(\Gamma\)-MAC\([H,P]\) -- a new universal MAC scheme | 2012-10-16 | Paper |
| Weimar-DM: a highly secure double-length compression function | 2012-09-07 | Paper |
| The collision security of MDC-4 | 2012-07-23 | Paper |
| Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule | 2011-12-16 | Paper |
| New boomerang attacks on ARIA | 2010-12-07 | Paper |
| Some observations on indifferentiability | 2010-10-25 | Paper |
| Collision resistant double-length hashing | 2010-10-12 | Paper |
| Security of cyclic double block length hash functions | 2010-01-07 | Paper |
| Helix: fast encryption and authentication in a single cryptographic primitive. | 2010-01-05 | Paper |
| Related-key rectangle attack of the full HAS-160 encryption mode | 2009-12-17 | Paper |
| Improved Generic Algorithms for 3-Collisions | 2009-12-15 | Paper |
| On the Security of Tandem-DM | 2009-08-11 | Paper |
| Attacking 9 and 10 Rounds of AES-256 | 2009-06-25 | Paper |
| Collisions and Near-Collisions for Reduced-Round Tiger | 2009-04-02 | Paper |
| Slide Attacks on a Class of Hash Functions | 2009-02-10 | Paper |
| New Related-Key Boomerang Attacks on AES | 2009-01-22 | Paper |
| Concrete Security for Entity Recognition: The Jane Doe Protocol | 2009-01-22 | Paper |
| A Failure-Friendly Design Principle for Hash Functions | 2008-03-18 | Paper |
| Efficient Simultaneous Broadcast | 2008-03-05 | Paper |
| Fast Software Encryption | 2006-06-22 | Paper |
| The sum of PRPs is a secure PRF | 2006-03-01 | Paper |
| Fast Software Encryption | 2005-12-27 | Paper |
| Advanced Encryption Standard – AES | 2005-09-14 | Paper |
| The Saturation Attack — A Bait for Twofish | 2004-08-12 | Paper |
| Bias in the LEVIATHAN Stream Cipher | 2004-08-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4736420 | 2004-08-09 | Paper |
| Pseudorandom functions in \(\text{TC}^0\) and cryptographic limitations to proving lower bounds | 2003-08-26 | Paper |
| A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3149706 | 2002-09-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4537993 | 2002-06-25 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2771759 | 2002-02-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2762792 | 2002-01-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941807 | 2000-07-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4484888 | 2000-06-05 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4941803 | 2000-03-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4220502 | 1998-11-24 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4387316 | 1998-05-07 | Paper |