| Publication | Date of Publication | Type |
|---|
| \textsc{ChiLow} and \textsc{ChiChi}: new constructions for code encryption | 2025-11-20 | Paper |
New models for the cryptanalysis of ASCON Designs, Codes and Cryptography | 2025-07-18 | Paper |
| Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT | 2024-12-13 | Paper |
| A generic algorithm for efficient key recovery in differential attacks -- and its associated tool | 2024-11-12 | Paper |
| A CP-based automatic tool for instantiating truncated differential characteristics | 2024-10-23 | Paper |
| A simpler model for recovering superpoly on Trivium | 2024-10-14 | Paper |
Differential meet-in-the-middle cryptanalysis Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Revisiting related-key boomerang attacks on AES using computer-aided tool Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
New algorithm for exhausting optimal permutations for generalized Feistel networks Lecture Notes in Computer Science | 2023-08-14 | Paper |
| Cryptanalysis results on spook. Bringing full-round shadow-512 to the light | 2022-12-07 | Paper |
| Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 | 2021-12-08 | Paper |
Linearly equivalent s-boxes and the division property Designs, Codes and Cryptography | 2020-10-07 | Paper |
| Cryptanalysis of \texttt{SKINNY} in the framework of the \texttt{SKINNY} 2018--2019 cryptanalysis competition | 2020-07-21 | Paper |
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE Journal of Cryptology | 2020-06-15 | Paper |
Troika: a ternary cryptographic hash function Designs, Codes and Cryptography | 2020-01-09 | Paper |
| Variants of the AES key schedule for better truncated differential bounds | 2019-02-20 | Paper |
| Programming the Demirci-Selçuk meet-in-the-middle attack with constraints | 2019-01-23 | Paper |
Key-recovery attacks on \(\mathsf{ASASA}\) Journal of Cryptology | 2018-09-14 | Paper |
Note on impossible differential attacks Fast Software Encryption | 2018-05-09 | Paper |
Low-Data Complexity Attacks on AES IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Automatic search of meet-in-the-middle and impossible differential attacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Key-recovery attacks on \(\mathsf {ASASA}\) Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Differential analysis and meet-in-the-middle attack against round-reduced TWINE Fast Software Encryption | 2015-09-18 | Paper |
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE Fast Software Encryption | 2015-09-18 | Paper |
Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES Fast Software Encryption | 2015-09-18 | Paper |
Faster chosen-key distinguishers on reduced-round AES Lecture Notes in Computer Science | 2014-08-20 | Paper |
Improved key recovery attacks on reduced-round AES in the single-key setting Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Automatic search of attacks on round-reduced AES and applications Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
| Bounded Cohomology and $l_1$-Homology of Three-Manifolds | 2008-09-25 | Paper |