| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2011 | Boomerang Attacks on BLAKE-32 | fse | 218 |
| 2 | 2011 | Second-Order Differential Collisions for Reduced SHA-256 | asiacrypt | 270-287 |
| 3 | 2011 | Search for Related-key Differential Characteristics in DES-like ciphers | fse | 18 |
| 4 | 2010 | Rotational Rebound Attacks on Reduced Skein | asiacrypt | 1-19 |
| 5 | 2010 | Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others | eprint | online |
| 6 | 2010 | Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others | eurocrypt | 322-344 |
| 7 | 2010 | Rotational Cryptanalysis of ARX | fse | 333-346 |
| 8 | 2009 | Distinguisher and Related-Key Attack on the Full AES-256 | crypto | 231-249 |
| 9 | 2009 | Rebound Attack on the Full Lane Compression Function | asiacrypt | 106-125 |
| 10 | 2009 | Meet-in-the-Middle Attacks on SHA-3 Candidates | fse | 228-245 |
| 11 | 2009 | Cryptanalysis of the LAKE Hash Family | fse | 156-179 |
| 12 | 2008 | Collisions for Step-Reduced SHA-256 | fse | online |
Coauthors of Ivica Nikolić |