1. An Braeken, Christopher Wolf, and Bart Preneel, Classification of highly nonlinear Boolean power functions with a randomised algorithm for checking normality, IACR (2004), 17 pages.[eprint]
  2. An Braeken, Christopher Wolf, and Bart Preneel, A study of the security of unbalanced oil and vinegar signature schemes, Topics in Cryptology—CT-RSA 2005, Lecture Notes in Comput. Sci., vol. 3376, Springer, Berlin, 2005, pp. 29–43.[MR]
  3. J. Ding, J. E. Gower, D. Schmidt, C. Wolf, and Z. Yin, Complexity estimates for the F4 attack on the perturbed Matsumoto-Imai cryptosystem, Cryptography and coding, Lecture Notes in Comput. Sci., vol. 3796, Springer, Berlin, 2005, pp. 262–277.[MR]
  4. Christopher Wolf, An Braeken, and Bart Preneel, Efficient cryptanalysis of RSE(2) PKC and RSSE(2) PKC, Security in Communication Networks: Fourth International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Lecture Notes in Comput. Sci., vol. 3352, Springer, Berlin, 2005, pp. 294–309.
  5. Christopher Wolf, An Braeken, and Bart Preneel, On the security of stepwise triangular systems, Des. Codes Cryptogr. 40 (2006), no. 3, 285–302.[MR]