| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | A (Second) Preimage Attack on the GOST Hash Function | fse | 224-234 |
| 2 | 2008 | Cryptanalysis of the GOST Hash Function | crypto | 162-178 |
| 3 | 2008 | Analysis of Step-Reduced SHA-256 | eprint | online |
| 4 | 2006 | An Analysis of the Hermes8 Stream Ciphers | eprint | online |
| 5 | 2006 | Second Preimages for Iterated Hash Functions Based on a b-Block Bypass | eprint | online |
| 6 | 2006 | Analysis of Step-Reduced SHA-256 | fse | online |
| 7 | 2006 | The Impact of Carries on the Complexity of Collision Attacks on SHA-1 | fse | online |
| 8 | 2005 | Successfully Attacking Masked AES Hardware Implementations | ches | online |
| 9 | 2005 | A Side-Channel Analysis Resistant Description of the AES S-Box | fse | online |
| 10 | 2005 | Smashing SMASH | eprint | online |
| 11 | 2004 | Secure and Efficient Masking of AES - A Mission Impossible? | eprint | online |
Coauthors of Norbert Pramstaller |