BIRYUKOV, A., Lamberger, M., Mendel, F., & NIKOLIC, I. (2011). Second-Order Differential Collisions for Reduced SHA-256. In 17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 270-287). Springer. Peer reviewed |
BIRYUKOV, A., & NIKOLIC, I. (2011). Search for Related-Key Differential Characteristics in DES-Like Ciphers. In Fast Software Encryption - 18th International Workshop (pp. 18-34). Springer. Peer reviewed |
BIRYUKOV, A., NIKOLIC, I., & ROY, A. (2011). Boomerang Attacks on BLAKE-32. In Fast Software Encryption - 18th International Workshop (pp. 218-237). Springer. Peer reviewed |
BIRYUKOV, A., & NIKOLIC, I. (2010). Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others. In EUROCRYPT (pp. 322-344). Peer reviewed |
Matusiewicz, K., Naya-Plasencia, M., NIKOLIC, I., Sasaki, Y., & Schläffer, M. (2009). Rebound Attack on the Full Lane Compression Function. In Advances in Cryptology - ASIACRYPT 2009 (pp. 106-125). Berlin, Germany: Springer. doi:10.1007/978-3-642-10366-7_7 |
BIRYUKOV, A., Gauravaram, P., Guo, J., KHOVRATOVICH, D., Ling, S., Matusiewicz, K., NIKOLIC, I., Pieprzyk, J., & Wang, H. (2009). Cryptanalysis of the LAKE Hash Family. In Fast Software Encryption (pp. 156-179). Springer. doi:10.1007/978-3-642-03317-9_10 Peer reviewed |
KHOVRATOVICH, D., BIRYUKOV, A., & NIKOLIC, I. (2009). Speeding up Collision Search for Byte-Oriented Hash Functions. In CT-RSA (pp. 164-181). Springer. doi:10.1007/978-3-642-00862-7_11 Peer reviewed |
BIRYUKOV, A., KHOVRATOVICH, D., & NIKOLIC, I. (2009). Distinguisher and Related-Key Attack on the Full AES-256. In Advances in Cryptology - CRYPTO (pp. 231-249). Springer. doi:10.1007/978-3-642-03356-8_14 Peer reviewed |
NIKOLIC, I., & BIRYUKOV, A. (2008). Collisions for Step-Reduced SHA-256. In Fast Software Encryption - 15th International Workshop, Revised Selected Papers (pp. 1–15). Springer. Peer reviewed |