- D. Khovratovich, I. Nikolić, J. Pieprzyk, P. Sokolowski. R. Steinfeld, Rotational Cryptanalysis of ARX Revisited, Journal of Cryptology (in preparation)
- J. Jean, I. Nikolić , Y. Sasaki, L. Wang, Practical Forgeries and Distinguishers against PAES, IEICE Transactions, 2016.
- J. Guo, J. Jean, I. Nikolić , Y. Sasaki, Extended meet-in-the-middle attacks on some Feistel constructions, Designs, Codes and Cryptography, 2016.
- Ivica Nikolić, Lei Wang, Shuang Wu, The Parallel-Cut Meet-in-the-middle Attack, Cryptography and Communications
- Sareh Emami, San Ling, Ivica Nikolić, Josef Pieprzyk, Huaxiong Wang, The Resistance of PRESENT-80 Against Related-Key Differential Attacks, Cryptography and Communications, September 2014
- Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger, Rotational Rebound Attacks on Reduced Skein, Journal of Cryptology, July 2014.
- Ivica Nikolić, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor, Finding The Greedy, Prodigal, and Suicidal Contracts at Scale, ACSAC 2018
- Ivica Nikolić , How to Use Metaheuristics for Design of Symmetric-Key Primitives, ASIACRYPT 2017
- D. B. Roy, S. Bhasin, I. Nikolic, D. Mukhopadhyay, Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security. IVSW 2017
- A. D. Dwivedi, M. Kloucek, P. Morawiecki, I. Nikolic, J. Pieprzyk, S. Wójtowicz, SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. SECRYPT 2017
- Ivica Nikolić , Yu Sasaki, A New Algorithm for the Unbalanced Meet-in-the-Middle Problem, ASIACRYPT 2016
- J. Guo, J. Jean, I. Nikolić , Y. Sasaki, Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions, IACR Transactions on Symmetric Cryptology 2016/Fast Software Encryption 2017
- J. Guo, J. Jean, I. Nikolić , K. Qiao, Y. Sasaki, S. M. Sim, Invariant Subspace Attack Against Midori64 and the Resistance Criteria for S-box Designs, IACR Transactions on Symmetric Cryptology 2016/Fast Software Encryption 2017
- Jeremy Jean, Ivica Nikolić, Efficient Design Strategies Based on the AES Round Function. Fast Software Encryption 2016
- Ivica Nikolić, Yu Sasaki, Refinements of the k-tree Algorithm for the Generalized Birthday Problem. ASIACRYPT 2015
- Jérémy Jean, Ivica Nikolić, Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation, FSE 2015
- Dmitry Khovratovich, Ivica Nikolić, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld, Rotational Cryptanalysis of ARX Revisited, FSE 2015
- Jian Guo, Jérémy Jean, Ivica Nikolić, Yu Sasaki, Meet-in-the-Middle Attacks on Generic Feistel Constructions, ASIACRYPT 2014.
- Sareh Emami, San Ling, Ivica Nikolić, Josef Pieprzyk, Huaxiong Wang, Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128, ASIACRYPT 2014.
- Jérémy Jean, Ivica Nikolić, Thomas Peyrin, Tweaks and Keys for Block Ciphers: the TWEAKEY Framework, ASIACRYPT 2014.
- Alex Biryukov, Ivica Nikolić, Colliding Keys for SC2000-256, SAC 2014.
- Jérémy Jean, Ivica Nikolić, Yu Sasaki, Lei Wang, Practical Cryptanalysis of PAES, SAC 2014.
- Jian Guo, Pierre Karpman, Ivica Nikolić, Lei Wang, Shuang Wu, Analysis of BLAKE2, CT-RSA 2014.
- Alex Biryukov, Ivica Nikolić, Complementing Feistel Ciphers, FSE 2013.
- Ivica Nikolić, Lei Wang and Shuang Wu, Cryptanalysis of Round-Reduced LED, FSE 2013.
- Jérémy Jean, Ivica Nikolić, Thomas Peyrin, Lei Wang and Shuang Wu, Security Analysis of PRINCE, FSE 2013.
- Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolić, Second-Order Differential Collisions for Reduced SHA-256, ASIACRYPT 2011.
- Alex Biryukov, Ivica Nikolić, Search for Related-key Differential Characteristics in DES-like ciphers, FSE 2011.
- Alex Biryukov, Ivica Nikolić, Arnab Roy, Boomerang Attacks on BLAKE-32, FSE 2011.
- Dmitry Khovratovich, Ivica Nikolić, Christian Rechberger, Rotational Rebound Attacks on Reduced Skein, ASIACRYPT 2010 (Best Paper Award).
- Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld, Known and Chosen Key Differential Distinguishers for Block Ciphers , ICISC 2010.
- Ivica Nikolić, Tweaking AES, SAC 2010.
- Alex Biryukov, Ivica Nikolić, Automatic Search for Related-Key Differentials in Byte-Oriented Block Ciphers, EUROCRYPT 2010.
- Dmitry Khovratovich, Ivica Nikolić, Rotational Cryptanalysis of ARX, FSE 2010.
- Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolić, Yu Sasaki, Martin Schläffer: Rebound Attack on the Lane Compression Function, ASIACRYPT 2009.
- Alex Biryukov, Dmitry Khovratovich, Ivica Nikolić: Distinguisher and Related-Key Attack on the Full AES-256, CRYPTO 2009.
- Dmitry Khovratovich, Alex Biryukov, Ivica Nikolić: Speeding up collision search for byte-oriented hash functions, CT-RSA 2009.
- A. Biryukov, P. Gauravaram, J. Guo, D. Khovratovich, S. Ling, K. Matusiewicz, Ivica Nikolić, J. Pieprzyk, H. Wang: Cryptanalysis of the LAKE Hash Family, FSE 2009.
- Dmitry Khvoratovich, Ivica Nikolić, Ralf-Philipp Weinman: Meet-in-the-middle attacks on SHA-3 candidates, FSE 2009.
- Ivica Nikolić, Alex Biryukov: Collisions for step-reduced SHA-256, FSE 2008.