| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model | pkc | 353-371 |
| 2 | 2012 | Differential Attacks against Stream Cipher ZUC | asiacrypt | 262-277 |
| 3 | 2012 | On the (In)Security of IDEA in Various Hashing Modes | fse | 163-179 |
| 4 | 2011 | Pushing the Limits: A Very Compact and a Threshold Implementation of AES | eurocrypt | 69 |
| 5 | 2011 | Side-Channel Resistant Crypto for Less than 2, 300 GE | jofc | 322-345 |
| 6 | 2010 | Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | asiacrypt | 56-75 |
| 7 | 2010 | Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | eprint | online |
| 8 | 2010 | 256 Bit Standardized Crypto for 650 GE - GOST Revisited | ches | 219-233 |
| 9 | 2009 | Cryptanalysis of the LAKE Hash Family | fse | 156-179 |
| 10 | 2008 | Cryptanalysis of LASH | fse | 207-223 |
| 11 | 2008 | Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes | asiacrypt | 19-36 |
| 12 | 2007 | Cryptanalysis of LASH | eprint | online |