| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2010 | Differential and invertibility properties of BLAKE (full version) | eprint | online |
| 2 | 2010 | Distinguishers for the Compression Function and Output Transformation of Hamsi-256 | eprint | online |
| 3 | 2010 | Differential and Invertibility Properties of BLAKE | fse | 318-332 |
| 4 | 2009 | Cryptanalysis of C2 | crypto | 250-266 |
| 5 | 2009 | Rebound Attack on the Full Lane Compression Function | asiacrypt | 106-125 |
| 6 | 2009 | Preimages for Step-Reduced SHA-2 | asiacrypt | 578-597 |
| 7 | 2009 | Cryptanalysis of the LAKE Hash Family | fse | 156-179 |
| 8 | 2008 | Cryptanalysis of LASH | fse | 207-223 |
| 9 | 2007 | Cryptanalysis of LASH | eprint | online |
| 10 | 2007 | Cryptanalysis of FORK-256 | fse | 19-38 |
| 11 | 2006 | Weaknesses of the FORK-256 compression function | eprint | online |
| 12 | 2004 | Finding good differential patterns for attacks on SHA-1 | eprint | online |