| Publication | Date of Publication | Type |
|---|
| Vectorial fast correlation attacks | 2026-03-31 | Paper |
| A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH | 2024-10-16 | Paper |
Coefficient grouping for complex affine layers Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Coefficient grouping: breaking Chaghri and more Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
| Near collision attack against Grain v1 | 2023-11-09 | Paper |
Algebraic meet-in-the-middle attack on LowMC Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Algebraic attacks on Rasta and Dasta using low-degree equations Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Algebraic Attacks on Round-Reduced Keccak | 2023-04-13 | Paper |
| Automatic verification of differential characteristics: application to reduced Gimli | 2022-12-07 | Paper |
Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021 IEEE Transactions on Information Theory | 2022-10-11 | Paper |
The inverse of \(\chi\) and its applications to Rasta-like ciphers Journal of Cryptology | 2022-10-06 | Paper |
| Grain-128AEADv2: strengthening the initialization against key reconstruction | 2022-06-29 | Paper |
| Cryptanalysis of full LowMC and LowMC-M with algebraic techniques | 2022-04-22 | Paper |
| Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD | 2021-12-01 | Paper |
Modeling for three-subset division property without unknown subset Journal of Cryptology | 2021-08-10 | Paper |
| On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet | 2020-07-21 | Paper |
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT Designs, Codes and Cryptography | 2020-05-21 | Paper |
| Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 | 2020-05-12 | Paper |
| Cryptanalysis of ForkAES | 2020-01-30 | Paper |
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly IEEE Transactions on Computers | 2020-01-28 | Paper |
A New Cube Attack on MORUS by Using Division Property IEEE Transactions on Computers | 2020-01-28 | Paper |
New cube distinguishers on NFSR-based stream ciphers Designs, Codes and Cryptography | 2020-01-09 | Paper |
| An AEAD variant of the Grain stream cipher | 2019-10-14 | Paper |
Cube Attacks on Non-Blackbox Polynomials Based on Division Property IEEE Transactions on Computers | 2019-03-07 | Paper |
| Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 | 2018-09-26 | Paper |
| A key-recovery attack on 855-round Trivium | 2018-09-26 | Paper |
| Improved division property based cube attacks exploiting algebraic properties of superpoly | 2018-09-12 | Paper |
| Fast near collision attack on the Grain v1 stream cipher | 2018-07-09 | Paper |
Design and analysis of small-state grain-like stream ciphers Cryptography and Communications | 2018-05-28 | Paper |
| Cube attacks on non-blackbox polynomials based on division property | 2017-10-27 | Paper |
Truncated differential based known-key attacks on round-reduced SIMON Designs, Codes and Cryptography | 2017-04-13 | Paper |
Optimized interpolation attacks on lowMC Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0 Lecture Notes in Computer Science | 2015-12-10 | Paper |
Improved differential attacks on RC5 Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Fast Software Encryption | 2015-09-18 | Paper |
The hash function \texttt{BLAKE} Information Security and Cryptography | 2014-12-15 | Paper |
Differential biases in reduced-round Keccak Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Quark: a lightweight hash Journal of Cryptology | 2013-06-27 | Paper |
High order differential attacks on stream ciphers Cryptography and Communications | 2013-06-24 | Paper |
Synthetic linear analysis with applications to CubeHash and Rabbit Cryptography and Communications | 2013-06-24 | Paper |
New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4 Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Stream ciphers, a perspective. (Abstract) Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Conditional Differential Cryptanalysis of Trivium and KATAN Selected Areas in Cryptography | 2012-06-08 | Paper |
Practical Analysis of Reduced-Round Keccak Lecture Notes in Computer Science | 2011-12-16 | Paper |
Fast Correlation Attacks: Methods and Countermeasures Fast Software Encryption | 2011-07-07 | Paper |
Cryptanalysis of the knapsack generator Fast Software Encryption | 2011-07-07 | Paper |
Conditional differential cryptanalysis of NLFSR-based cryptosystems Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Quark: a lightweight hash Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Differential and invertibility properties of BLAKE Fast Software Encryption | 2010-07-13 | Paper |
Cryptanalysis of ESSENCE Fast Software Encryption | 2010-07-13 | Paper |
Improved Linear Differential Attacks on CubeHash Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Some remarks on FCSRs and implications for stream ciphers Journal of Mathematical Cryptology | 2010-02-05 | Paper |
Improved cryptanalysis of Skein Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Linearization framework for collision attacks: application to CubeHash and MD6 Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 Selected Areas in Cryptography | 2009-11-03 | Paper |
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium Fast Software Encryption | 2009-08-11 | Paper |
Inside the Hypercube Information Security and Privacy | 2009-06-25 | Paper |
Cryptanalysis of Achterbahn Fast Software Encryption | 2009-04-02 | Paper |
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher Information Security and Privacy | 2009-03-06 | Paper |
On Reconstruction of RC4 Keys from Internal States Mathematical Methods in Computer Science | 2009-01-22 | Paper |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba Fast Software Encryption | 2008-09-18 | Paper |
The Hash Function Family LAKE Fast Software Encryption | 2008-09-18 | Paper |
Algebraic Immunity of S-Boxes and Augmented Functions Fast Software Encryption | 2008-09-16 | Paper |
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Analysis of Multivariate Hash Functions Lecture Notes in Computer Science | 2008-05-06 | Paper |
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Reduced Complexity Attacks on the Alternating Step Generator Selected Areas in Cryptography | 2008-03-25 | Paper |
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
Fault Attacks on Combiners with Memory Selected Areas in Cryptography | 2007-11-15 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks Advances in Cryptology - EUROCRYPT 2006 | 2007-09-24 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Analysis of SSC2 Fast Software Encryption | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2085432 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2009966 (Why is no real title available?) | 2003-11-26 | Paper |
| scientific article; zbMATH DE number 2009965 (Why is no real title available?) | 2003-11-26 | Paper |
| scientific article; zbMATH DE number 1759264 (Why is no real title available?) | 2002-06-25 | Paper |
| scientific article; zbMATH DE number 1304083 (Why is no real title available?) | 2000-04-10 | Paper |
| scientific article; zbMATH DE number 1394293 (Why is no real title available?) | 2000-01-31 | Paper |
Analysis Methods for (Alleged) RC4 Lecture Notes in Computer Science | 1999-06-17 | Paper |
| scientific article; zbMATH DE number 1088915 (Why is no real title available?) | 1998-02-11 | Paper |
Cryptography and elliptic curves Elemente der Mathematik | 1997-01-01 | Paper |
| scientific article; zbMATH DE number 820502 (Why is no real title available?) | 1996-07-04 | Paper |
| scientific article; zbMATH DE number 708816 (Why is no real title available?) | 1995-08-13 | Paper |
| scientific article; zbMATH DE number 503278 (Why is no real title available?) | 1994-05-16 | Paper |
Analysis of Pseudo Random Sequences Generated by Cellular Automata Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177035 (Why is no real title available?) | 1993-05-18 | Paper |
Correlation properties of combiners with memory in stream ciphers Journal of Cryptology | 1992-06-28 | Paper |
| scientific article; zbMATH DE number 4195884 (Why is no real title available?) | 1990-01-01 | Paper |
Fast correlation attacks on certain stream ciphers Journal of Cryptology | 1989-01-01 | Paper |
Some topological properties of Kaehler manifolds and homogeneous spaces Mathematische Zeitschrift | 1983-01-01 | Paper |
On Fibre Inclusions and Kahler Manifolds Proceedings of the American Mathematical Society | 1983-01-01 | Paper |
Rational universal fibrations and flag manifolds Mathematische Annalen | 1982-01-01 | Paper |
HOMOTOPY GROUPS OF ACYCLIC SPACES The Quarterly Journal of Mathematics | 1981-01-01 | Paper |
Minimal models for non-nilpotent spaces Commentarii Mathematici Helvetici | 1980-01-01 | Paper |
Complex and real K-theory and localization Journal of Pure and Applied Algebra | 1979-01-01 | Paper |
Acyclic maps and knot complements Mathematische Annalen | 1979-01-01 | Paper |
PULLBACK THEOREMS AND PHANTOM MAPS The Quarterly Journal of Mathematics | 1978-01-01 | Paper |
Homotopy nilpotency and localization Mathematische Zeitschrift | 1978-01-01 | Paper |
| scientific article; zbMATH DE number 3638770 (Why is no real title available?) | 1978-01-01 | Paper |
| scientific article; zbMATH DE number 3535328 (Why is no real title available?) | 1976-01-01 | Paper |
| scientific article; zbMATH DE number 3500731 (Why is no real title available?) | 1975-01-01 | Paper |
| scientific article; zbMATH DE number 3491875 (Why is no real title available?) | 1975-01-01 | Paper |