| Publication | Date of Publication | Type |
|---|
| Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond | 2024-11-12 | Paper |
| Improving the rectangle attack on GIFT-64 | 2024-10-16 | Paper |
CCA security for contracting (quasi-)Feistel constructions with tight round complexity Designs, Codes and Cryptography | 2024-08-13 | Paper |
Revisiting the boomerang attack from a perspective of 3-differential IEEE Transactions on Information Theory | 2024-07-23 | Paper |
Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery Journal of Cryptology | 2024-05-13 | Paper |
| Improved differential cryptanalysis on SPECK using plaintext structures | 2024-01-11 | Paper |
Optimizing rectangle attacks: a unified and generic framework for key recovery Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Key structures: improved related-key boomerang attack against the full AES-256 Information Security and Privacy | 2023-07-26 | Paper |
| Towards closing the security gap of Tweak-aNd-Tweak (TNT) | 2023-03-21 | Paper |
| TNT: how to tweak a block cipher | 2022-03-23 | Paper |
Security analysis of subterranean 2.0 Designs, Codes and Cryptography | 2021-08-02 | Paper |
| On edge Mostar index of graphs | 2021-05-17 | Paper |
| Some properties of the leap eccentric connectivity index of graphs | 2021-05-17 | Paper |
| Leap eccentric connectivity index of some graph operations with subdivided edges | 2021-04-07 | Paper |
Weighted k-prototypes clustering algorithm based on the hybrid dissimilarity coefficient Mathematical Problems in Engineering | 2020-08-25 | Paper |
Practical collision attacks against round-reduced SHA-3 Journal of Cryptology | 2020-03-03 | Paper |
| Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes | 2019-02-20 | Paper |
| New MILP modeling: improved conditional cube attacks on KECCAK-based constructions | 2019-01-23 | Paper |
| Improved differential analysis of block cipher PRIDE | 2018-12-07 | Paper |
| Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s | 2018-10-24 | Paper |
| Related-key impossible differential analysis of full Khudra | 2018-10-24 | Paper |
| Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis | 2018-10-18 | Paper |
| Boomerang Connectivity Table: a new cryptanalysis tool | 2018-07-09 | Paper |
| Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak} | 2017-11-15 | Paper |
New collision attacks on round-reduced Keccak Lecture Notes in Computer Science | 2017-06-23 | Paper |
Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak} Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Automatic differential analysis of ARX block ciphers with application to SPECK and LEA Information Security and Privacy | 2016-09-02 | Paper |
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks Information Security and Cryptology | 2015-12-02 | Paper |
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers Lecture Notes in Computer Science | 2015-09-18 | Paper |
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers Lecture Notes in Computer Science | 2015-01-16 | Paper |
Differential Fault Attack on the PRINCE Block Cipher Lecture Notes in Computer Science | 2013-10-10 | Paper |
Novel intrusion detection algorithm based on semi-supervised clustering Journal of Computer Applications | 2009-11-22 | Paper |
| Weak convergence of the distribution of independent random variable series in Hilbert spaces | 2008-04-04 | Paper |