| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2006 | eprint | online | |
| 2 | 2005 | LILI-II is not Broken | eprint | online |
| 3 | 2005 | 3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function | eprint | online |
| 4 | 2005 | Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1 | eprint | online |
| 5 | 2003 | Linear Redundancy in S-Boxes | fse | online |
| 6 | 2002 | On Linear Redundancy in the AES S-Box | eprint | online |
| 7 | 2000 | Efficient Methods for Generating MARS-Like S-Boxes | fse | 300-314 |
| 8 | 1998 | Heuristic Design of Cryptographically Strong Balanced Boolean Functions | eurocrypt | 489-499 |
Coauthors of William Millan |