| Publication | Date of Publication | Type |
|---|
Partial sums meet FFT: improved attack on 6-round AES | 2024-11-12 | Paper |
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity Forum of Mathematics, Sigma | 2024-11-06 | Paper |
The retracing boomerang attack, with application to reduced-round AES Journal of Cryptology | 2024-08-30 | Paper |
scientific article; zbMATH DE number 7829259 (Why is no real title available?) | 2024-04-09 | Paper |
Practical-time related-key attack on GOST with secret S-boxes Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Quantum time/memory/data tradeoff attacks Designs, Codes and Cryptography | 2024-01-15 | Paper |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Local concentration inequalities and Tomaszewski’s conjecture Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing | 2023-11-14 | Paper |
Improved covering results for conjugacy classes of symmetric groups via hypercontractivity | 2023-10-27 | Paper |
Sharp Hypercontractivity for Global Functions | 2023-07-03 | Paper |
On $t$-Intersecting Families of Permutations | 2023-03-28 | Paper |
Proof of Tomaszewski's conjecture on randomly signed sums Advances in Mathematics | 2022-08-24 | Paper |
Practical key recovery attacks on FlexAEAD Designs, Codes and Cryptography | 2022-03-31 | Paper |
Three third generation attacks on the format preserving encryption scheme FF3 | 2021-12-08 | Paper |
Mind the middle layer: the HADES design strategy revisited | 2021-12-08 | Paper |
New slide attacks on almost self-similar ciphers | 2021-12-01 | Paper |
The retracing boomerang attack | 2021-12-01 | Paper |
The junta method for hypergraphs and the Erdős-Chvátal simplex conjecture Advances in Mathematics | 2021-10-27 | Paper |
Tight bounds on online checkpointing algorithms | 2021-07-28 | Paper |
Tight Bounds on Online Checkpointing Algorithms ACM Transactions on Algorithms | 2021-05-03 | Paper |
A structure theorem for almost low-degree functions on the slice Israel Journal of Mathematics | 2021-01-18 | Paper |
An optimal distributed discrete log protocol with applications to homomorphic secret sharing Lecture Notes in Computer Science | 2020-06-30 | Paper |
An optimal distributed discrete log protocol with applications to homomorphic secret sharing Journal of Cryptology | 2020-06-15 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities Journal of Cryptology | 2020-06-15 | Paper |
A practical forgery attack on Lilliput-AE Journal of Cryptology | 2020-06-15 | Paper |
DLCT: a new tool for differential-linear cryptanalysis | 2020-02-04 | Paper |
Biased halfspaces, noise sensitivity, and local Chernoff inequalities discrete Analysis | 2020-01-17 | Paper |
Stability versions of Erdős-Ko-Rado type theorems via isoperimetry Journal of the European Mathematical Society (JEMS) | 2019-12-12 | Paper |
Efficient dissection of bicomposite problems with cryptanalytic applications Journal of Cryptology | 2019-11-27 | Paper |
Quantum speedups need structure | 2019-11-09 | Paper |
A note on large \(H\)-intersecting families SIAM Journal on Discrete Mathematics | 2019-03-11 | Paper |
On a biased edge isoperimetric inequality for the discrete cube Journal of Combinatorial Theory. Series A | 2019-01-25 | Paper |
On the structure of subsets of the discrete cube with small edge boundary Discrete Analysis | 2019-01-09 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities Lecture Notes in Computer Science | 2018-09-26 | Paper |
Efficient slide attacks Journal of Cryptology | 2018-09-14 | Paper |
Approximation of biased Boolean functions of small total influence by DNFs Bulletin of the London Mathematical Society | 2018-08-31 | Paper |
Chvátal's conjecture and correlation inequalities Journal of Combinatorial Theory. Series A | 2018-03-02 | Paper |
The junta method in extremal hypergraph theory and Chvátal's conjecture | 2018-01-18 | Paper |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Low-Data Complexity Attacks on AES IEEE Transactions on Information Theory | 2017-06-08 | Paper |
WEM: a new family of white-box block ciphers based on the Even-Mansour construction Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
A \(2^{70}\) attack on the full MISTY1 Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Memory-Efficient Algorithms for Finding Needles in Haystacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Key recovery attacks on iterated Even-Mansour encryption schemes Journal of Cryptology | 2016-10-13 | Paper |
On the sum of the \(L_1\) influences of bounded functions Israel Journal of Mathematics | 2016-09-15 | Paper |
Juntas in the \(\ell_{1}\)-grid and Lipschitz maps between discrete tori Random Structures \& Algorithms | 2016-09-15 | Paper |
On the correlation of increasing families Journal of Combinatorial Theory. Series A | 2016-08-18 | Paper |
Stability for the Complete Intersection Theorem, and the Forbidden Intersection Problem of Erd\H{o}s and S\'os | 2016-04-20 | Paper |
New attacks on Feistel structures with improved memory complexities Lecture Notes in Computer Science | 2015-12-10 | Paper |
Reflections on slide with a twist attacks Designs, Codes and Cryptography | 2015-10-26 | Paper |
Cryptanalysis of SP networks with partial non-linear layers Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Improved linear sieving techniques with applications to step-reduced LED-64 Fast Software Encryption | 2015-09-18 | Paper |
Almost universal forgery attacks on AES-based MAC's Designs, Codes and Cryptography | 2015-09-01 | Paper |
Practical-time attacks against reduced variants of~MISTY1 Designs, Codes and Cryptography | 2015-09-01 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 Journal of Cryptology | 2015-08-03 | Paper |
New attacks on IDEA with at least 6 rounds Journal of Cryptology | 2015-05-12 | Paper |
Slidex attacks on the Even-Mansour encryption scheme Journal of Cryptology | 2015-03-25 | Paper |
Cryptanalysis of iterated Even-Mansour schemes with two keys Lecture Notes in Computer Science | 2015-01-16 | Paper |
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony Journal of Cryptology | 2015-01-07 | Paper |
Geometric influences. II: Correlation inequalities and noise sensitivity Annales de l'Institut Henri Poincaré. Probabilités et Statistiques | 2014-12-05 | Paper |
Quantitative relation between noise sensitivity and influences Combinatorica | 2014-05-05 | Paper |
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Cryptanalysis of the stream cipher LEX Designs, Codes and Cryptography | 2013-05-06 | Paper |
A note on the entropy/influence conjecture Discrete Mathematics | 2012-10-26 | Paper |
A tight quantitative version of Arrow's impossibility theorem Journal of the European Mathematical Society (JEMS) | 2012-10-19 | Paper |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Lecture Notes in Computer Science | 2012-09-25 | Paper |
A simple reduction from a biased measure on the discrete cube to the uniform measure European Journal of Combinatorics | 2012-09-12 | Paper |
Minimalism in cryptography: the Even-Mansour scheme revisited Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Geometric influences The Annals of Probability | 2012-06-19 | Paper |
A practical attack on KeeLoq Journal of Cryptology | 2012-05-23 | Paper |
A Quantitative Version of the Gibbard–Satterthwaite Theorem for Three Alternatives SIAM Journal on Computing | 2011-10-18 | Paper |
On the influences of variables on Boolean functions in product spaces Combinatorics, Probability and Computing | 2011-01-17 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
The effects of the omission of last round's MixColumns on AES Information Processing Letters | 2010-09-07 | Paper |
Distinguishing attacks on stream ciphers based on arrays of pseudo-random words Information Processing Letters | 2010-09-02 | Paper |
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
On the probability of a rational outcome for generalized social welfare functions on three alternatives Journal of Combinatorial Theory. Series A | 2010-04-21 | Paper |
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers Information Processing Letters | 2010-04-19 | Paper |
Differential-linear cryptanalysis of Serpent. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Rectangle attacks on 49-round SHACAL-1. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Linear transformations of monotone functions on the discrete cube Discrete Mathematics | 2009-12-09 | Paper |
Lower bound on the correlation between monotone families in the average case Advances in Applied Mathematics | 2009-06-11 | Paper |
Instant ciphertext-only cryptanalysis of GSM encrypted communication Journal of Cryptology | 2009-06-08 | Paper |
Cryptanalysis of CTC2 Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
An Improved Impossible Differential Attack on MISTY1 Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
A New Attack on the LEX Stream Cipher Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
New Impossible Differential Attacks on AES Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
A Differential-Linear Attack on 12-Round Serpent Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
A New Criterion for Nonlinearity of Block Ciphers IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A Unified Approach to Related-Key Attacks Fast Software Encryption | 2008-09-18 | Paper |
Improved Slide Attacks Fast Software Encryption | 2008-09-16 | Paper |
A New Attack on 6-Round IDEA Fast Software Encryption | 2008-09-16 | Paper |
Related-Key Rectangle Attack on 42-Round SHACAL-2 Lecture Notes in Computer Science | 2008-06-17 | Paper |
Related-Key Boomerang and Rectangle Attacks Lecture Notes in Computer Science | 2008-05-06 | Paper |
New Cryptanalytic Results on IDEA Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
A Simple Related-Key Attack on the Full SHACAL-1 Lecture Notes in Computer Science | 2008-04-17 | Paper |
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers Lecture Notes in Computer Science | 2008-04-17 | Paper |
A Practical Attack on KeeLoq Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1 Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
The Delicate Issues of Addition with Respect to XOR Differences Selected Areas in Cryptography | 2008-03-25 | Paper |
A Related-Key Rectangle Attack on the Full KASUMI Lecture Notes in Computer Science | 2008-03-18 | Paper |
Related-Key Rectangle Attack on the Full SHACAL-1 Selected Areas in Cryptography | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Spectral properties of sign symmetric matrices The Electronic Journal of Linear Algebra | 2006-05-18 | Paper |
scientific article; zbMATH DE number 2089123 (Why is no real title available?) | 2004-08-12 | Paper |
Linear Cryptanalysis of Reduced Round Serpent Fast Software Encryption | 2004-08-12 | Paper |
Enhancing Differential-Linear Cryptanalysis Lecture Notes in Computer Science | 2003-07-16 | Paper |
Positivity of principal minors, sign symmetry and stability. Linear Algebra and its Applications | 2003-05-04 | Paper |
scientific article; zbMATH DE number 1722685 (Why is no real title available?) | 2002-03-21 | Paper |
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR | N/A | Paper |