| year | title | booktitle | pages |
|---|
| 1 | 2012 | Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems | crypto  | 719-740 |
| 2 | 2012 | Improved Attacks on Full GOST | fse | 9-28 |
| 3 | 2012 | New Attacks on Keccak-224 and Keccak-256 | fse  | 442-461 |
| 4 | 2012 | Minimalism in Cryptography: The Even-Mansour Scheme Revisited | eurocrypt | 336-354 |
| 5 | 2010 | Improved Single-Key Attacks on 8-Round AES-192 and AES-256 | asiacrypt | 158-176 |
| 6 | 2010 | A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony | eprint | online |
| 7 | 2010 | A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony | crypto | 393-410 |
| 8 | 2010 | Related-Key Boomerang and Rectangle Attacks | eprint | online |
| 9 | 2010 | The Effects of the Omission of Last Round's MixColumns on AES | eprint | online |
| 10 | 2010 | Improved Single-Key Attacks on 8-round AES | eprint | online |
| 11 | 2010 | Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds | eurocrypt | 299-319 |
| 12 | 2010 | Another Look at Complementation Properties | fse | 347-364 |
| 13 | 2009 | On the Security of Iterated Hashing based on Forgery-resistant Compression Functions | eprint | online |
| 14 | 2009 | KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers | ches | 272-288 |
| 15 | 2009 | Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers | fse | |
| 16 | 2008 | A Unified Approach to Related-Key Attacks | fse | 73-96 |
| 17 | 2008 | Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers | eprint | online |
| 18 | 2008 | A New Attack on the LEX Stream Cipher | asiacrypt | 539-556 |
| 19 | 2008 | An Improved Impossible Differential Attack on MISTY1 | asiacrypt | 441-454 |
| 20 | 2008 | New Impossible Differential Attacks on AES | eprint | online |
| 21 | 2008 | A Practical Attack on KeeLoq | eurocrypt | 1-18 |
| 22 | 2007 | Improved Slide Attacks | fse | 153-166 |
| 23 | 2007 | A New Attack on 6-Round IDEA | fse | 211-224 |
| 24 | 2007 | Differential Cryptanalysis in Stream Ciphers | eprint | online |
| 25 | 2007 | A Framework for Iterative Hash Functions - HAIFA | eprint | online |
| 26 | 2006 | New Cryptanalytic Results on IDEA | asiacrypt | online |
| 27 | 2006 | Linear Cryptanalysis of CTC | eprint | online |
| 28 | 2005 | Related-Key Boomerang and Rectangle Attacks | eurocrypt | online |
| 29 | 2005 | A Related-Key Rectangle Attack on the Full KASUMI | asiacrypt | online |
| 30 | 2005 | New Combined Attacks on Block Ciphers | fse | online |
| 31 | 2003 | Differential-Linear Cryptanalysis of Serpent | fse | online |
| 32 | 2003 | Rectangle Attacks on 49-Round SHACAL-1 | fse | online |
| 33 | 2002 | New Results on Boomerang and Rectangle Attack | eprint | online |
| 34 | 2002 | Enhancing Differential-Linear Cryptanalysis | asiacrypt | online |
| 35 | 2002 | Differential and Linear Cryptanalysis of a Reduced-Round SC2000 | fse | online |
| 36 | 2002 | New Results on Boomerang and Rectangle Attacks | fse | online |
| 37 | 2001 | The Rectangle Attack - Rectangling the Serpent | eurocrypt | 340-357 |
| 38 | 2001 | The Rectangle Attack - Rectangling the Serpent | eprint | online |
| 39 | 2001 | Linear Cryptanalysis of Reduced Round Serpent | fse | 16-27 |