| Publication | Date of Publication | Type |
|---|
The COLM Authenticated Encryption Scheme Journal of Cryptology | 2024-04-21 | Paper |
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure | 2024-03-14 | Paper |
Higher-order DCA against standard side-channel countermeasures Constructive Side-Channel Analysis and Secure Design | 2023-10-20 | Paper |
Troika: a ternary cryptographic hash function Designs, Codes and Cryptography | 2020-01-09 | Paper |
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants Fast Software Encryption | 2018-05-09 | Paper |
Linear cryptanalysis of DES with asymmetries | 2018-04-06 | Paper |
Hold your breath, PRIMATEs are lightweight | 2018-02-16 | Paper |
SPONGENT: The Design Space of Lightweight Cryptographic Hashing IEEE Transactions on Computers | 2017-07-12 | Paper |
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks IEEE Transactions on Computers | 2017-07-12 | Paper |
Towards practical whitebox cryptography: optimizing efficiency and space hardness Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Atomic-AES: a compact implementation of the AES encryption/decryption core Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Exploring energy efficiency of lightweight block ciphers Lecture Notes in Computer Science | 2016-05-19 | Paper |
Fast and memory-efficient key recovery in side-channel attacks Lecture Notes in Computer Science | 2016-05-19 | Paper |
\texttt{Midori}: a block cipher for low energy Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
How secure is AES under leakage Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Cryptanalysis of two fault countermeasure schemes Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Twisted Polynomials and Forgery Attacks on GCM Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 Fast Software Encryption | 2015-09-18 | Paper |
ALE: AES-based lightweight authenticated encryption Fast Software Encryption | 2015-09-18 | Paper |
Towards Understanding the Known-Key Security of Block Ciphers Fast Software Encryption | 2015-09-18 | Paper |
APE: authenticated permutation-based encryption for lightweight cryptography Fast Software Encryption | 2015-09-18 | Paper |
Comb to pipeline: fast software encryption revisited Fast Software Encryption | 2015-09-18 | Paper |
Key recovery attacks on recent authenticated ciphers Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |
Bicliques with minimal data and time complexity for AES Information Security and Cryptology - ICISC 2014 | 2015-09-11 | Paper |
General application of FFT in cryptanalysis and improved attack on CAST-256 Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis Journal of Computational and Applied Mathematics | 2015-06-17 | Paper |
How to securely release unverified plaintext in authenticated encryption Lecture Notes in Computer Science | 2015-01-16 | Paper |
Towards the optimality of Feistel ciphers with substitution-permutation functions Designs, Codes and Cryptography | 2014-08-18 | Paper |
Route 66: passively breaking all GSM channels Information Security and Privacy | 2014-07-24 | Paper |
On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers Applied Cryptography and Network Security | 2014-07-07 | Paper |
Multidimensional zero-correlation linear cryptanalysis of E2 Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard Information Processing Letters | 2014-04-17 | Paper |
Linear hulls with correlation zero and linear cryptanalysis of block ciphers Designs, Codes and Cryptography | 2014-03-17 | Paper |
Parallelizable and authenticated online ciphers Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Key difference invariant bias in block ciphers Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
On the indifferentiability of key-alternating ciphers Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Bounds in shallows and in miseries Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Improved impossible differential attacks on large-block Rijndael Lecture Notes in Computer Science | 2013-06-04 | Paper |
Analysis of \(3\)-line generalized Feistel networks with double SD-functions Information Processing Letters | 2013-04-04 | Paper |
Integral and multidimensional linear distinguishers with correlation zero Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Generalized Feistel networks revisited Designs, Codes and Cryptography | 2013-01-28 | Paper |
Zero correlation linear cryptanalysis with reduced data complexity Fast Software Encryption | 2013-01-08 | Paper |
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers Information Processing Letters | 2012-07-25 | Paper |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract) Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Enumerating the \(k\)-tangle projections Journal of Knot Theory and its Ramifications | 2012-04-30 | Paper |
On the differential and linear efficiency of balanced Feistel networks Information Processing Letters | 2012-03-27 | Paper |
Biclique Cryptanalysis of the Full AES Lecture Notes in Computer Science | 2011-12-02 | Paper |
Double SP-functions: enhanced generalized Feistel networks (extended abstract) Information Security and Privacy | 2011-07-07 | Paper |
On unbalanced feistel networks with contracting MDS diffusion Designs, Codes and Cryptography | 2011-04-08 | Paper |
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN Selected Areas in Cryptography | 2011-03-15 | Paper |
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Linear Slide Attacks on the KeeLoq Block Cipher Information Security and Cryptology | 2009-02-10 | Paper |
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Hash Functions and RFID Tags: Mind the Gap Cryptographic Hardware and Embedded Systems – CHES 2008 | 2009-01-09 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
Improved Side-Channel Collision Attacks on AES Selected Areas in Cryptography | 2008-03-25 | Paper |
Classification of $k$-tangle projections using cascade representation | 2007-12-22 | Paper |