| Publication | Date of Publication | Type |
|---|
| Can a differential attack work for an arbitrarily large number of rounds? | 2022-03-24 | Paper |
| Systematic construction of nonlinear product attacks on block ciphers | 2020-07-08 | Paper |
| Invariant Hopping Attacks on Block Ciphers | 2020-02-08 | Paper |
| How Many Weak-Keys Exist in T-310 ? | 2019-09-30 | Paper |
| Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher | 2019-02-07 | Paper |
| Two philosophies for solving non-linear equations in algebraic cryptanalysis | 2017-10-23 | Paper |
| On optimal size in truncated differential attacks | 2017-03-31 | Paper |
| Speed Optimizations in Bitcoin Key Recovery Attacks | 2017-03-29 | Paper |
| An Improved Differential Attack on Full GOST | 2016-05-02 | Paper |
| Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants | 2016-03-04 | Paper |
| Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers | 2016-02-24 | Paper |
| CRYPTANALYSIS OF GOST IN THE MULTIPLE-KEY SCENARIO | 2014-03-14 | Paper |
| Aggregated differentials and cryptanalysis of PP-1 and GOST | 2013-08-06 | Paper |
| Contradiction Immunity and Guess-Then-Determine Attacks on Gost | 2013-02-11 | Paper |
| ElimLin Algorithm Revisited | 2013-01-08 | Paper |
| Self-similarity Attacks on Block Ciphers and Application to KeeLoq | 2012-06-08 | Paper |
| Random Permutation Statistics and an Improved Slide-Determine Attack on KeeLoq | 2012-06-08 | Paper |
| Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers | 2010-12-07 | Paper |
| Practical Algebraic Attacks on the Hitag2 Stream Cipher | 2009-09-29 | Paper |
| Statistics of Random Permutations and the Cryptanalysis Of Periodic Block Ciphers | 2009-05-22 | Paper |
| Public Key Cryptography – PKC 2004 | 2009-05-14 | Paper |
| Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts | 2009-01-22 | Paper |
| Algebraic and Slide Attacks on KeeLoq | 2008-09-18 | Paper |
| Algebraic Attacks on Combiners with Memory and Several Outputs | 2008-03-17 | Paper |
| Algebraic Cryptanalysis of the Data Encryption Standard | 2008-03-07 | Paper |
| Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
| On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions | 2007-09-07 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Fast Software Encryption | 2006-06-22 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3374924 | 2006-03-01 | Paper |
| Advanced Encryption Standard – AES | 2005-09-14 | Paper |
| Advanced Encryption Standard – AES | 2005-09-14 | Paper |
| Advances in Cryptology – CRYPTO 2004 | 2005-08-23 | Paper |
| Information and Communications Security | 2005-08-19 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3043940 | 2004-08-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474171 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4474187 | 2004-08-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4434885 | 2003-11-26 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4418532 | 2003-08-10 | Paper |
| A Fast and Secure Implementation of Sflash | 2003-07-27 | Paper |
| On the Security of HFE, HFEv- and Quartz | 2003-07-27 | Paper |
| Generic Attacks and the Security of Quartz | 2003-07-27 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4413323 | 2003-07-17 | Paper |
| Cryptanalysis of Block Ciphers with Overdefined Systems of Equations | 2003-07-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724446 | 2002-09-01 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724448 | 2001-11-18 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2724447 | 2001-07-12 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2707400 | 2001-07-03 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249252 | 1999-10-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4249637 | 1999-09-06 | Paper |