| Publication | Date of Publication | Type |
|---|
| The exact multi-user security of key-alternating Feistel ciphers with a single permutation | 2026-02-06 | Paper |
| The multi-user security of MACs via universal hashing in the ideal cipher model | 2024-11-12 | Paper |
| The exact multi-user security of 2-key triple DES | 2024-11-12 | Paper |
| The exact multi-user security of (tweakable) key alternating ciphers with a single permutation | 2024-11-12 | Paper |
| KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more | 2024-05-31 | Paper |
Secret can be public: low-memory AEAD mode for high-order masking Advances in Cryptology – CRYPTO 2022 | 2023-06-30 | Paper |
On the Efficiency of ZMAC-Type Modes Cryptology and Network Security | 2023-06-28 | Paper |
Double-block-length hash function for minimum memory size Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Lightweight authenticated encryption mode suitable for threshold implementation | 2022-03-23 | Paper |
| A highly secure MAC from tweakable blockciphers with support for short tweaks | 2020-05-27 | Paper |
| Improved XKX-based AEAD scheme: removing the birthday terms | 2020-03-02 | Paper |
| Improved security bound of LightMAC\_Plus and its single-key variant | 2020-01-21 | Paper |
| Optimally indifferentiable double-block-length hashing without post-processing and with support for longer key than single block | 2020-01-14 | Paper |
| Sandwich construction for keyed sponges: independence between capacity and online queries | 2018-10-26 | Paper |
| Keyed sponge with prefix-free padding: independence between capacity and online queries without the suffix key | 2018-09-26 | Paper |
New bounds for keyed sponges with extendable output: independence between capacity and message length Fast Software Encryption | 2018-05-09 | Paper |
| Blockcipher-based MACs: beyond the birthday bound without message length | 2018-02-23 | Paper |
| Output masking of tweakable Even-Mansour can be eliminated for message authentication code | 2018-02-16 | Paper |
| Indifferentiability of double-block-length hash function without feed-forward operations | 2017-08-25 | Paper |
Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$ Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Full PRF-secure message authentication code based on tweakable block cipher Provable Security | 2016-01-27 | Paper |
Improved Indifferentiable Security Analysis of PHOTON Lecture Notes in Computer Science | 2014-10-14 | Paper |
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC Advances in Information and Computer Security | 2014-09-15 | Paper |
How to construct sufficient conditions for hash functions Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
Reset indifferentiability from weakened random oracle salvages one-pass hash functions Applied Cryptography and Network Security | 2014-07-07 | Paper |
Blockcipher-based double-length hash functions for pseudorandom oracles Selected Areas in Cryptography | 2012-06-08 | Paper |
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model Provable Security | 2011-09-16 | Paper |
How to confirm cryptosystems security: the original Merkle-Damgård is still alive! Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
A New Strategy for Finding a Differential Path of SHA-1 Information Security and Privacy | 2009-03-06 | Paper |
Improved Collision Search for SHA-0 Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |