| 2008 |
| 6 | EE | Emilia Käsper,
Vincent Rijmen,
Tor E. Bjørstad,
Christian Rechberger,
Matthew J. B. Robshaw,
Gautham Sekar:
Correlated Keystreams in Moustique.
AFRICACRYPT 2008: 246-257 |
| 2007 |
| 5 | EE | Gautham Sekar,
Souradyuti Paul,
Bart Preneel:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.
INDOCRYPT 2007: 58-72 |
| 4 | EE | Orr Dunkelman,
Gautham Sekar,
Bart Preneel:
Improved Meet-in-the-Middle Attacks on Reduced-Round DES.
INDOCRYPT 2007: 86-100 |
| 3 | EE | Gautham Sekar,
Souradyuti Paul,
Bart Preneel:
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
ISC 2007: 249-262 |
| 2 | EE | Gautham Sekar,
Souradyuti Paul,
Bart Preneel:
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
WEWoRC 2007: 127-141 |
| 2006 |
| 1 | EE | Souradyuti Paul,
Bart Preneel,
Gautham Sekar:
Distinguishing Attacks on the Stream Cipher Py.
FSE 2006: 405-421 |