| Publication | Date of Publication | Type |
|---|
| Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT | 2024-12-13 | Paper |
| \textsc{Ascon} MAC, PRF, and short-input PRF. Lightweight, fast, and efficient pseudorandom functions | 2024-11-12 | Paper |
| \(L^*\)-based learning of Markov decision processes | 2024-03-14 | Paper |
Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
| An algebraic attack on ciphers with low-degree round functions: application to full MiMC | 2023-03-21 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Information-combining differential fault attacks on DEFAULT | 2022-08-30 | Paper |
| Computing expected differential probability of (truncated) differentials and expected linear potential of (multidimensional) linear hulls in SPN block ciphers | 2022-07-06 | Paper |
Practical key recovery attacks on FlexAEAD Designs, Codes and Cryptography | 2022-03-31 | Paper |
| PRINCEv2. More security for (almost) no overhead | 2022-03-25 | Paper |
\(L^\ast\)-based learning of Markov decision processes (extended version) Formal Aspects of Computing | 2021-09-14 | Paper |
\textsc{Ascon} v1.2: lightweight authenticated encryption and hashing Journal of Cryptology | 2021-08-10 | Paper |
| Algebraic cryptanalysis of variants of \textsc{Frit} | 2020-07-21 | Paper |
| Forgery attacks on FlexAE and FlexAEAD | 2020-05-06 | Paper |
| Statistical ineffective fault attacks on masked AES with fault countermeasures | 2019-01-23 | Paper |
Cryptanalysis of MORUS Lecture Notes in Computer Science | 2019-01-23 | Paper |
| Rasta: a cipher with low ANDdepth and few ANDs per bit | 2018-09-12 | Paper |
Analysis of the Kupyna-256 Hash Function Fast Software Encryption | 2018-05-09 | Paper |
| Cryptanalysis of Simpira v1 | 2018-02-16 | Paper |
Statistical fault attacks on nonce-based authenticated encryption schemes Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Square attack on 7-round Kiasu-BC Applied Cryptography and Network Security | 2016-10-04 | Paper |
Higher-Order Cryptanalysis of LowMC Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
Forgery Attacks on Round-Reduced ICEPOLE-128 Lecture Notes in Computer Science | 2016-05-19 | Paper |
Malicious hashing: Eve's variant of SHA-1 Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Analysis of SHA-512/224 and SHA-512/256 Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Cryptanalysis of Ascon Lecture Notes in Computer Science | 2016-03-02 | Paper |
Related-Key Forgeries for Prøst-OTR Fast Software Encryption | 2015-09-18 | Paper |
Branching heuristics in differential collision search with applications to SHA-512 Fast Software Encryption | 2015-09-18 | Paper |
Key recovery attacks on recent authenticated ciphers Progress in Cryptology - LATINCRYPT 2014 | 2015-09-17 | Paper |