| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2011 | Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions | asiacrypt | 288-307 |
| 2 | 2011 | Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches | jofc | 292-321 |
| 3 | 2010 | The Rebound Attack and Subspace Distinguishers: Application to Whirlpool | eprint | online |
| 4 | 2010 | Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function | eprint | online |
| 5 | 2010 | Distinguishers for the Compression Function and Output Transformation of Hamsi-256 | eprint | online |
| 6 | 2009 | MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners | asiacrypt | 144-161 |
| 7 | 2009 | Rebound Attack on the Full Lane Compression Function | asiacrypt | 106-125 |
| 8 | 2009 | Rebound Distinguishers: Results on the Full Whirlpool Compression Function | asiacrypt | 126-143 |
| 9 | 2009 | The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl | fse | 260-276 |
| 10 | 2008 | Collisions for Round-Reduced LAKE | eprint | online |
| 11 | 2006 | Searching for Differential Paths in MD4 | fse | online |
Coauthors of Martin Schläffer |