| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | Collision Attack on the Waterfall Hash Function | eprint | online |
| 2 | 2007 | The Security of the Extended Codebook (XCB) Mode of Operation | eprint | online |
| 3 | 2005 | Multiple forgery attacks against Message Authentication Codes | eprint | online |
| 4 | 2004 | The Extended Codebook (XCB) Mode of Operation | eprint | online |
| 5 | 2002 | Improved key recovery of level 1 of the Bluetooth Encryption System | eprint | online |
| 6 | 2001 | Cryptanalysis of the Mercy Block Cipher | fse | 28-36 |
| 7 | 2001 | Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family | fse | 135-143 |
| 8 | 2000 | Statistical Analysis of the Alleged RC4 Keystream Generator | fse | 19-30 |
Coauthors of Scott R. Fluhrer |