2023
Modifications of bijective S-Boxes with linear structures.
Cryptogr. Commun., May, 2023
2022
Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.
IEEE Trans. Inf. Theory, 2022
Characterisation of Bijectivity Preserving Componentwise Modification of S-Boxes.
IACR Cryptol. ePrint Arch., 2022
2021
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2021
Editorial: Special issue on Boolean functions and their applications 2020.
Cryptogr. Commun., 2021
2020
Symmetric Cryptography (Dagstuhl Seminar 20041).
Dagstuhl Reports, 2020
2019
Multidimensional Linear Cryptanalysis.
J. Cryptol., 2019
The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions.
IACR Cryptol. ePrint Arch., 2019
Linear Approximations of Random Functions and Permutations.
IACR Cryptol. ePrint Arch., 2019
Affine linear cryptanalysis.
Cryptogr. Commun., 2019
2018
Symmetric Cryptography (Dagstuhl Seminar 18021).
Dagstuhl Reports, 2018
2017
Differential-Linear Cryptanalysis Revisited.
J. Cryptol., 2017
Statistical and Linear Independence of Binary Random Variables.
IACR Cryptol. ePrint Arch., 2017
Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity.
Des. Codes Cryptogr., 2017
2016
Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2016
Capacity and Data Complexity in Multidimensional Linear Attack.
IACR Cryptol. ePrint Arch., 2016
Symmetric Cryptography (Dagstuhl Seminar 16021).
Dagstuhl Reports, 2016
2015
Reflection Cryptanalysis of PRINCE-Like Ciphers.
J. Cryptol., 2015
Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks.
IACR Cryptol. ePrint Arch., 2015
Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities.
IACR Cryptol. ePrint Arch., 2015
New Links Between Differential and Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2015
Perfect nonlinear functions and cryptography.
Finite Fields Their Appl., 2015
2014
Zero-correlation linear cryptanalysis of reduced-round LBlock.
Des. Codes Cryptogr., 2014
2013
Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers.
Des. Codes Cryptogr., 2013
2012
Multiple Differential Cryptanalysis using \LLR and χ<sup>2</sup> Statistics.
IACR Cryptol. ePrint Arch., 2012
Multidimensional linear distinguishing attacks and Boolean functions.
Cryptogr. Commun., 2012
Multiple Differential Cryptanalysis Using LLR and χ 2 Statistics.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
"Provable" Security against Differential and Linear Cryptanalysis.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Estimating Resistance against Multidimensional Linear Attacks: An Application on DEAN.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
Integral and Multidimensional Linear Distinguishers with Correlation Zero.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Exploiting Linear Hull in Matsui's Algorithm 1 (extended version).
IACR Cryptol. ePrint Arch., 2011
Linear Cryptanalysis Using Multiple Linear Approximations.
IACR Cryptol. ePrint Arch., 2011
2010
A practical distinguisher for the Shannon cipher.
J. Syst. Softw., 2010
On the Nonlinearity of Discrete Logarithm in \mathbb <i>F</i><sub>2<sup><i>n</i></sup></sub>\mathbb F_{2^n}.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010
Consecutive S-box Lookups: A Timing Attack on SNOW 3G.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited.
Proceedings of the Topics in Cryptology, 2010
2009
A multidimensional linear distinguishing attack on the Shannon cipher.
Int. J. Appl. Cryptogr., 2009
Multidimensional Extension of Matsui's Algorithm 2.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
On Modular Decomposition of Integers.
Proceedings of the Progress in Cryptology, 2009
2008
Random Beacon for Privacy and Group Security.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Message from the SecPri Workshop Organizing Technical Co-chairs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent.
Proceedings of the Information Security and Cryptology, 2008
Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
Linear Distinguishing Attack on Shannon.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Wireless Group Security Using MAC Layer Multicast.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Multidimensional Walsh Transform and a Characterization of Bent Functions.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007
Differential Properties of Elliptic Curves and Blind Signatures.
Proceedings of the Information Security, 10th International Conference, 2007
A Key-Recovery Attack on SOBER-128.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007
2006
Improved Linear Distinguishers for SNOW 2.0.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Ad Hoc Security Associations for Groups.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Efficient Mutual Data Authentication Using Manually Authenticated Strings.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
2005
Efficient Mutual Data Authentication Using Manually Authenticated Strings.
IACR Cryptol. ePrint Arch., 2005
2004
IKE in Ad Hoc IP Networking.
Proceedings of the Security in Ad-hoc and Sensor Networks, First European Workshop, 2004
2003
Defining Authorization Domains Using Virtual Devices.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003
Wiley, ISBN: 978-0-470-84794-7, 2003
2002
Man-in-the-Middle in Tunnelled Authentication Protocols.
IACR Cryptol. ePrint Arch., 2002
2001
Correlation theorems in cryptanalysis.
Discret. Appl. Math., 2001
1999
Correlation Properties of the Bluetooth Combiner Generator.
Proceedings of the Information Security and Cryptology, 1999
1996
Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem.
Des. Codes Cryptogr., 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Fast Accumulated Hashing.
Proceedings of the Fast Software Encryption, 1996
Generalized Feistel Networks.
Proceedings of the Advances in Cryptology, 1996
1995
Provable Security Against a Differential Attack.
J. Cryptol., 1995
1994
S-boxes and Round Functions with Controllable Linearity and Differential Uniformity.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Linear Approximation of Block Ciphers.
Proceedings of the Advances in Cryptology, 1994
1993
New Bent Mappings Suitable for Fast Implementation.
Proceedings of the Fast Software Encryption, 1993
Differentially Uniform Mappings for Cryptography.
Proceedings of the Advances in Cryptology, 1993
A New Signature Scheme Based on the DSA Giving Message Recovery.
Proceedings of the CCS '93, 1993
1992
On the Construction of Highly Nonlinear Permutations.
Proceedings of the Advances in Cryptology, 1992
Provable Security Against Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 1992
1991
Perfect Nonlinear S-Boxes.
Proceedings of the Advances in Cryptology, 1991
1990
Constructions of Bent Functions and Difference Sets.
Proceedings of the Advances in Cryptology, 1990