| Publication | Date of Publication | Type |
|---|
Partial sums meet FFT: improved attack on 6-round AES | 2024-11-12 | Paper |
Another look at differential-linear attacks | 2024-10-16 | Paper |
The retracing boomerang attack, with application to reduced-round AES Journal of Cryptology | 2024-08-30 | Paper |
Practical-time related-key attack on GOST with secret S-boxes Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Quantum time/memory/data tradeoff attacks Designs, Codes and Cryptography | 2024-01-15 | Paper |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Full round zero-sum distinguishers on \textsf{TinyJAMBU}-128 and \textsf{TinyJAMBU}-192 keyed-permutation in the known-key setting Lecture Notes in Computer Science | 2023-08-14 | Paper |
Counting active S-boxes is not enough | 2022-07-06 | Paper |
Automatic search for bit-based division property | 2022-06-15 | Paper |
Practical key recovery attacks on FlexAEAD Designs, Codes and Cryptography | 2022-03-31 | Paper |
Three third generation attacks on the format preserving encryption scheme FF3 | 2021-12-08 | Paper |
New slide attacks on almost self-similar ciphers | 2021-12-01 | Paper |
The retracing boomerang attack | 2021-12-01 | Paper |
Biased differential distinguisher -- cryptanalysis of reduced-round \textsc{SKINNY} Information and Computation | 2021-11-25 | Paper |
Tight bounds on online checkpointing algorithms | 2021-07-28 | Paper |
Tight Bounds on Online Checkpointing Algorithms ACM Transactions on Algorithms | 2021-05-03 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities Journal of Cryptology | 2020-06-15 | Paper |
A practical forgery attack on Lilliput-AE Journal of Cryptology | 2020-06-15 | Paper |
DLCT: a new tool for differential-linear cryptanalysis | 2020-02-04 | Paper |
Efficient dissection of bicomposite problems with cryptanalytic applications Journal of Cryptology | 2019-11-27 | Paper |
Improved key recovery attacks on reduced-round AES with practical data and memory complexities Lecture Notes in Computer Science | 2018-09-26 | Paper |
Efficient slide attacks Journal of Cryptology | 2018-09-14 | Paper |
Efficient construction of diamond structures | 2018-04-26 | Paper |
New second preimage attacks on dithered hash functions with low memory complexity | 2018-02-16 | Paper |
Boosting authenticated encryption robustness with minimal modifications | 2017-10-27 | Paper |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Low-Data Complexity Attacks on AES IEEE Transactions on Information Theory | 2017-06-08 | Paper |
WEM: a new family of white-box block ciphers based on the Even-Mansour construction Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Memory-Efficient Algorithms for Finding Needles in Haystacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Key recovery attacks on iterated Even-Mansour encryption schemes Journal of Cryptology | 2016-10-13 | Paper |
New second-preimage attacks on hash functions Journal of Cryptology | 2016-10-13 | Paper |
New attacks on Feistel structures with improved memory complexities Lecture Notes in Computer Science | 2015-12-10 | Paper |
Reflections on slide with a twist attacks Designs, Codes and Cryptography | 2015-10-26 | Paper |
Cryptanalysis of SP networks with partial non-linear layers Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Improved linear sieving techniques with applications to step-reduced LED-64 Fast Software Encryption | 2015-09-18 | Paper |
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials Fast Software Encryption | 2015-09-18 | Paper |
Improved top-down techniques in differential cryptanalysis Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Almost universal forgery attacks on AES-based MAC's Designs, Codes and Cryptography | 2015-09-01 | Paper |
Practical-time attacks against reduced variants of~MISTY1 Designs, Codes and Cryptography | 2015-09-01 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 Journal of Cryptology | 2015-08-03 | Paper |
New attacks on IDEA with at least 6 rounds Journal of Cryptology | 2015-05-12 | Paper |
Slidex attacks on the Even-Mansour encryption scheme Journal of Cryptology | 2015-03-25 | Paper |
Cryptanalysis of iterated Even-Mansour schemes with two keys Lecture Notes in Computer Science | 2015-01-16 | Paper |
A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony Journal of Cryptology | 2015-01-07 | Paper |
Improved practical attacks on round-reduced Keccak Journal of Cryptology | 2014-09-25 | Paper |
From multiple encryption to knapsacks -- efficient dissection of composite problems Lecture Notes in Computer Science | 2014-08-20 | Paper |
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Cryptanalysis of the stream cipher LEX Designs, Codes and Cryptography | 2013-05-06 | Paper |
New attacks on Keccak-224 and Keccak-256 Fast Software Encryption | 2013-01-08 | Paper |
Improved Attacks on Full GOST Fast Software Encryption | 2013-01-08 | Paper |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Lecture Notes in Computer Science | 2012-09-25 | Paper |
Minimalism in cryptography: the Even-Mansour scheme revisited Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
New insights on impossible differential cryptanalysis Selected Areas in Cryptography | 2012-06-08 | Paper |
A practical attack on KeeLoq Journal of Cryptology | 2012-05-23 | Paper |
Techniques for cryptanalysis of block ciphers. (to appear) Information Security and Cryptography | 2012-03-16 | Paper |
Linear analysis of reduced-round CubeHash Applied Cryptography and Network Security | 2011-06-28 | Paper |
Attacks on hash functions based on Generalized Feistel: application to reduced-round \textit{Lesamnta} and \textit{SHAvite-3}\(_{512}\) Selected Areas in Cryptography | 2011-03-15 | Paper |
Improved single-key attacks on 8-round AES-192 and AES-256 Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
The effects of the omission of last round's MixColumns on AES Information Processing Letters | 2010-09-07 | Paper |
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony Advances in Cryptology – CRYPTO 2010 | 2010-08-24 | Paper |
Another look at complementation properties Fast Software Encryption | 2010-07-13 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Treatment of the initial value in Time-Memory-Data Tradeoff attacks on stream ciphers Information Processing Letters | 2010-04-19 | Paper |
Differential-linear cryptanalysis of Serpent. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Rectangle attacks on 49-round SHACAL-1. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Related-key rectangle attack of the full HAS-160 encryption mode Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Herding, second preimage and Trojan message attacks beyond Merkle-Damgård Selected Areas in Cryptography | 2009-12-09 | Paper |
Cryptanalysis of dynamic SHA(2) Selected Areas in Cryptography | 2009-12-09 | Paper |
KATAN and KTANTAN — A Family of Small and Efficient Hardware-Oriented Block Ciphers Lecture Notes in Computer Science | 2009-11-10 | Paper |
Cryptanalysis of Vortex Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Cryptanalysis of CTC2 Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
An Improved Impossible Differential Attack on MISTY1 Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
A New Attack on the LEX Stream Cipher Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
New Impossible Differential Attacks on AES Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
A Differential-Linear Attack on 12-Round Serpent Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
A New Criterion for Nonlinearity of Block Ciphers IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A Unified Approach to Related-Key Attacks Fast Software Encryption | 2008-09-18 | Paper |
Improved Slide Attacks Fast Software Encryption | 2008-09-16 | Paper |
A New Attack on 6-Round IDEA Fast Software Encryption | 2008-09-16 | Paper |
Related-Key Rectangle Attack on 42-Round SHACAL-2 Lecture Notes in Computer Science | 2008-06-17 | Paper |
Related-Key Boomerang and Rectangle Attacks Lecture Notes in Computer Science | 2008-05-06 | Paper |
New Cryptanalytic Results on IDEA Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
A Simple Related-Key Attack on the Full SHACAL-1 Lecture Notes in Computer Science | 2008-04-17 | Paper |
A Practical Attack on KeeLoq Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Improved Meet-in-the-Middle Attacks on Reduced-Round DES Lecture Notes in Computer Science | 2008-04-11 | Paper |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1 Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
The Delicate Issues of Addition with Respect to XOR Differences Selected Areas in Cryptography | 2008-03-25 | Paper |
A Related-Key Rectangle Attack on the Full KASUMI Lecture Notes in Computer Science | 2008-03-18 | Paper |
Related-Key Rectangle Attack on the Full SHACAL-1 Selected Areas in Cryptography | 2007-11-29 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
scientific article; zbMATH DE number 2089123 (Why is no real title available?) | 2004-08-12 | Paper |
Linear Cryptanalysis of Reduced Round Serpent Fast Software Encryption | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2089125 (Why is no real title available?) | 2004-08-12 | Paper |
Enhancing Differential-Linear Cryptanalysis Lecture Notes in Computer Science | 2003-07-16 | Paper |
scientific article; zbMATH DE number 1722685 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1583933 (Why is no real title available?) | 2001-07-08 | Paper |
scientific article; zbMATH DE number 1304130 (Why is no real title available?) | 2000-02-01 | Paper |