| Publication | Date of Publication | Type |
|---|
\texttt{HAWKEYE} -- recovering symmetric cryptography from hardware circuits | 2024-12-13 | Paper |
Falling into bytes and pieces -- cryptanalysis of an Apple patent application | 2024-10-23 | Paper |
Another class of non-normal bent functions | 2024-09-18 | Paper |
New families of functions with differential uniformity of 4 | 2024-09-18 | Paper |
On perfect linear approximations and differentials over two-round SPNs Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Differential meet-in-the-middle cryptanalysis Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Pitfalls and shortcomings for decompositions and alignment Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Constructing and deconstructing intentional weaknesses in symmetric ciphers Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
Simon's algorithm and symmetric crypto: generalizations and automatized applications Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
Strong and tight security guarantees against integral distinguishers Lecture Notes in Computer Science | 2023-05-12 | Paper |
Generic framework for key-guessing improvements Lecture Notes in Computer Science | 2023-05-12 | Paper |
Lower bounds on the degree of block ciphers | 2023-03-21 | Paper |
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
Improved differential-linear attacks with applications to ARX ciphers Advances in Cryptology – CRYPTO 2020 | 2022-12-07 | Paper |
Improved differential-linear attacks with applications to ARX ciphers Journal of Cryptology | 2022-11-14 | Paper |
Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers | 2022-07-06 | Paper |
New attacks from old distinguishers improved attacks on serpent | 2022-07-06 | Paper |
A further study of quadratic APN permutations in dimension nine Finite Fields and their Applications | 2022-05-09 | Paper |
Trims and extensions of quadratic APN functions Designs, Codes and Cryptography | 2022-03-31 | Paper |
Weak-key distinguishers for AES | 2022-03-25 | Paper |
PRINCEv2. More security for (almost) no overhead | 2022-03-25 | Paper |
New Instances of Quadratic APN Functions IEEE Transactions on Information Theory | 2022-02-17 | Paper |
Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 | 2021-12-08 | Paper |
Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD | 2021-12-01 | Paper |
Modeling for three-subset division property without unknown subset Journal of Cryptology | 2021-08-10 | Paper |
Linearly Self-Equivalent APN Permutations in Small Dimension IEEE Transactions on Information Theory | 2021-07-23 | Paper |
4-uniform permutations with null nonlinearity Cryptography and Communications | 2021-07-13 | Paper |
BISON instantiating the whitened swap-or-not construction | 2020-02-04 | Paper |
Universal forgery and multiple forgeries of MergeMAC and generalized constructions | 2020-01-28 | Paper |
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 Journal of Cryptology | 2019-11-27 | Paper |
Nonlinear diffusion layers Designs, Codes and Cryptography | 2018-10-10 | Paper |
Rasta: a cipher with low ANDdepth and few ANDs per bit | 2018-09-12 | Paper |
Grover meets Simon -- quantumly attacking the FX-construction | 2018-03-08 | Paper |
Strong 8-bit sboxes with efficient masking in hardware | 2018-02-14 | Paper |
Proving resistance against invariant attacks: how to choose the round constants | 2017-11-15 | Paper |
Differential-linear cryptanalysis revisited Journal of Cryptology | 2017-10-12 | Paper |
SPONGENT: The Design Space of Lightweight Cryptographic Hashing IEEE Transactions on Computers | 2017-07-12 | Paper |
Reflection ciphers Designs, Codes and Cryptography | 2017-02-10 | Paper |
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64 Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Lightweight multiplication in \(\mathrm{GF}(2^n)\) with applications to MDS matrices Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Analyzing permutations for AES-like ciphers: understanding shiftrows Lecture Notes in Computer Science | 2016-03-02 | Paper |
Observations on the \textsf{SIMON} block cipher family Lecture Notes in Computer Science | 2015-12-10 | Paper |
An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers Selected Areas in Cryptography | 2015-12-04 | Paper |
A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Differential-Linear Cryptanalysis Revisited Fast Software Encryption | 2015-09-18 | Paper |
Normality of bent functions monomial and binomial bent functions | 2014-08-15 | Paper |
Block ciphers -- focus on the linear layer (feat. PRIDE) Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Bounds in shallows and in miseries Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Slender-set differential cryptanalysis Journal of Cryptology | 2013-04-15 | Paper |
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Integral and multidimensional linear distinguishers with correlation zero Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
On the Distribution of Linear Biases: Three Instructive Examples Lecture Notes in Computer Science | 2012-09-25 | Paper |
Analysis of Kasami-Welch functions in odd dimension using Stickelberger's theorem Journal of Combinatorics and Number Theory | 2012-08-26 | Paper |
Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract) Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
A new construction of highly nonlinear S-boxes Cryptography and Communications | 2012-02-21 | Paper |
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Switchings, extensions, and reductions in central digraphs Journal of Combinatorial Theory. Series A | 2011-07-07 | Paper |
Differential cryptanalysis of round-reduced printcipher: computing roots of permutations Fast Software Encryption | 2011-07-07 | Paper |
Cryptanalysis of PRESENT-like ciphers with secret S-boxes Fast Software Encryption | 2011-07-07 | Paper |
On linear hulls, statistical saturation attacks, PRESENT and a cryptanalysis of PUFFIN Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Counting all bent functions in dimension eight 99270589265934370305785861242880 Designs, Codes and Cryptography | 2011-04-08 | Paper |
Bounds on the degree of APN polynomials: the case of \(x^{-1} + g(x)\) Designs, Codes and Cryptography | 2011-04-08 | Paper |
PRINTcipher: A Block Cipher for IC-Printing Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
A highly nonlinear differentially 4 uniform power mapping that permutes fields of even degree Finite Fields and their Applications | 2010-07-07 | Paper |
Cache timing analysis of LFSR-based stream ciphers Cryptography and Coding | 2010-01-07 | Paper |
Cryptanalysis of C2 Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Kasami bent functions are not equivalent to their duals | 2009-07-06 | Paper |
Construction of bent functions from near-bent functions Journal of Combinatorial Theory. Series A | 2009-06-17 | Paper |
Constructing new APN functions from known ones Finite Fields and their Applications | 2009-04-08 | Paper |
On the classification of APN functions up to dimension five Designs, Codes and Cryptography | 2009-03-31 | Paper |
Bent functions embedded into the recursive framework of \(\mathbb{Z}\)-bent functions Designs, Codes and Cryptography | 2009-03-31 | Paper |
A Practical Key Recovery Attack on Basic TCHo Public Key Cryptography – PKC 2009 | 2009-03-24 | Paper |
Two Classes of Quadratic APN Binomials Inequivalent to Power Functions IEEE Transactions on Information Theory | 2009-02-24 | Paper |
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
scientific article; zbMATH DE number 5504476 (Why is no real title available?) | 2009-02-09 | Paper |
Hash Functions and RFID Tags: Mind the Gap Cryptographic Hardware and Embedded Systems – CHES 2008 | 2009-01-09 | Paper |
Monomial bent functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Bent Functions With $2^r$ Niho Exponents IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Normal Extensions of Bent Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A Counterexample to a Conjecture of Niho IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On exponents with highly divisible Fourier coefficients and conjectures of Niho and Dobbertin | 2008-12-10 | Paper |
Algebraic problems in symmetric cryptography: two recent results on highly nonlinear functions | 2008-12-10 | Paper |
Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents Smart Card Research and Advanced Applications | 2008-11-06 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
New Lightweight DES Variants Fast Software Encryption | 2008-09-16 | Paper |
Monomial bent functions and Stickelberger's theorem Finite Fields and their Applications | 2008-08-27 | Paper |
On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes Advances in Cryptology – CRYPTO 2005 | 2008-03-17 | Paper |
A Survey of Some Recent Results on Bent Functions Sequences and Their Applications - SETA 2004 | 2008-03-14 | Paper |
On the Classification of 4 Bit S-Boxes Arithmetic of Finite Fields | 2007-11-15 | Paper |
Construction of bent functions via Niho power functions Journal of Combinatorial Theory. Series A | 2006-08-04 | Paper |
Finding nonnormal bent functions Discrete Applied Mathematics | 2006-04-28 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2005-12-07 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |