| Publication | Date of Publication | Type |
|---|
| Scrutinizing the security of AES-based hashing and one-way functions | 2026-03-31 | Paper |
| Diving deep into the preimage security of AES-like hashing | 2024-11-12 | Paper |
| On the security of triplex- and multiplex-type constructions with smaller tweaks | 2024-10-23 | Paper |
Implicit key-stretching security of encryption schemes Lecture Notes in Computer Science | 2023-08-21 | Paper |
| Towards closing the security gap of Tweak-aNd-Tweak (TNT) | 2023-03-21 | Paper |
| Pholkos -- efficient large-state tweakable block ciphers from the AES round function | 2022-07-06 | Paper |
| Related-key impossible-differential attack on reduced-round \textsc{Skinny} | 2022-07-01 | Paper |
| \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption | 2022-06-15 | Paper |
\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations Designs, Codes and Cryptography | 2022-06-08 | Paper |
The Oribatida v1.3 family of lightweight authenticated encryption schemes Journal of Mathematical Cryptology | 2021-07-14 | Paper |
| XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing | 2020-03-02 | Paper |
| Parallelizable MACs based on the sum of PRPs with security beyond the birthday bound | 2020-01-30 | Paper |
| Cryptanalysis of ForkAES | 2020-01-30 | Paper |
| ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls | 2018-12-20 | Paper |
| Rasta: a cipher with low ANDdepth and few ANDs per bit | 2018-09-12 | Paper |
| Differential cryptanalysis of round-reduced \textsc{Sparx}-64/128 | 2018-08-10 | Paper |
RIV for robust authenticated encryption Fast Software Encryption | 2018-05-09 | Paper |
\textsc{POEx}: a beyond-birthday-bound-secure on-line cipher Cryptography and Communications | 2018-01-29 | Paper |
| Reforgeability of authenticated encryption schemes | 2017-08-25 | Paper |
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch Information Security and Privacy | 2016-09-02 | Paper |
Pipelineable on-line encryption Fast Software Encryption | 2015-09-18 | Paper |
A framework for automated independent-biclique cryptanalysis Fast Software Encryption | 2015-09-18 | Paper |
Differential cryptanalysis of round-reduced \textsc{Simon} and \textsc{Speck} Fast Software Encryption | 2015-09-18 | Paper |
Counter-\(b\)DM: a provably secure family of multi-block-length compression functions Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Mars attacks! revisited: differential attack on 12 rounds of the MARS core and defeating the complex MARS key-schedule Lecture Notes in Computer Science | 2011-12-16 | Paper |