| Publication | Date of Publication | Type |
|---|
Towards minimizing tweakable blockcipher-based generalized Feistel networks | 2024-10-23 | Paper |
Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III} | 2024-08-30 | Paper |
CCA security for contracting (quasi-)Feistel constructions with tight round complexity Designs, Codes and Cryptography | 2024-08-13 | Paper |
Towards minimizing non-linearity in type-II generalized Feistel networks | 2024-06-05 | Paper |
On the sequential indifferentiability of the Lai-Massey construction Designs, Codes and Cryptography | 2024-05-27 | Paper |
SpookChain: chaining a sponge-based AEAD with beyond-birthday security | 2024-03-12 | Paper |
Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
How fast can SM4 be in software? Information Security and Cryptology | 2023-08-21 | Paper |
Minimizing Even-Mansour ciphers for sequential indifferentiability (without key schedules) Lecture Notes in Computer Science | 2023-08-14 | Paper |
Sequential indifferentiability of confusion-diffusion networks Lecture Notes in Computer Science | 2023-05-12 | Paper |
Towards closing the security gap of Tweak-aNd-Tweak (TNT) | 2023-03-21 | Paper |
Packed multiplication: how to amortize the cost of side-channel masking? | 2023-03-21 | Paper |
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher Designs, Codes and Cryptography | 2023-03-17 | Paper |
TNT: how to tweak a block cipher | 2022-03-23 | Paper |
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations Designs, Codes and Cryptography | 2022-01-19 | Paper |
Related-key analysis of generalized Feistel networks with expanding round functions | 2021-12-20 | Paper |
Provable related-key security of contracting Feistel networks | 2021-12-08 | Paper |
A combined modelling and experimental study of heat shock factor SUMOylation in response to heat shock Journal of Theoretical Biology | 2021-10-21 | Paper |
Beyond-birthday security for permutation-based Feistel networks Designs, Codes and Cryptography | 2021-03-17 | Paper |
Collision resistant hashing from sub-exponential learning parity with noise | 2020-05-05 | Paper |
Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective IEEE Transactions on Information Theory | 2019-07-19 | Paper |
Beyond-birthday secure domain-preserving PRFs from a single permutation Designs, Codes and Cryptography | 2019-05-24 | Paper |
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security | 2018-12-20 | Paper |
Estimating differential-linear distinguishers and applications to CTC2 | 2018-12-07 | Paper |
Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour Designs, Codes and Cryptography | 2016-08-31 | Paper |
A synthetic indifferentiability analysis of interleaved double-key Even-Mansour ciphers Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Improved domain extender for the ideal cipher Cryptography and Communications | 2015-11-19 | Paper |
On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation Theory of Cryptography | 2015-07-06 | Paper |
Optimization algorithm of BP networks based on ant colony algorithm Journal of Computer Applications | 2012-08-30 | Paper |
Exact solution for a time-dependent multi-mode coupled quadratic Bose system Journal of Physics A: Mathematical and Theoretical | 2010-12-03 | Paper |
\(H^{\infty}\) variable universe fuzzy control for hysteretic systems | 2009-03-06 | Paper |