| Publication | Date of Publication | Type |
|---|
Practical key collision on AES and Kiasu-BC IEEE Transactions on Information Theory | 2026-03-18 | Paper |
| New collision attacks on round-reduced \textsf{SHA-512} | 2026-02-06 | Paper |
Exploiting output bits and the \(\chi\) operation in MitM preimage attacks on Keccak Designs, Codes and Cryptography | 2025-12-01 | Paper |
| New records in collision attacks on SHA-2 | 2024-11-12 | Paper |
| A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH | 2024-10-16 | Paper |
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Algebraic meet-in-the-middle attack on LowMC Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
| Improved differential-linear attack with application to round-reduced Speck32/64 | 2022-11-09 | Paper |
| Related-key impossible-differential attack on reduced-round \textsc{Skinny} | 2022-07-01 | Paper |
| Fast chosen-key distinguish attacks on round-reduced AES-192 | 2020-05-27 | Paper |
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT Designs, Codes and Cryptography | 2020-05-21 | Paper |
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 Designs, Codes and Cryptography | 2020-05-21 | Paper |
| Efficient collision attack frameworks for RIPEMD-160 | 2020-03-09 | Paper |
| Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes | 2019-02-20 | Paper |
| Collisions and semi-free-start collisions for round-reduced RIPEMD-160 | 2018-04-06 | Paper |
Boomerang and slide-rotational analysis of the SM3 hash function Selected Areas in Cryptography | 2015-12-04 | Paper |
(Pseudo-)preimage attacks on step-reduced HAS-160 and RIPEMD-160 Lecture Notes in Computer Science | 2015-11-03 | Paper |
Practical collision attack on 40-step RIPEMD-128 Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD Journal of Computer Science and Technology | 2014-02-11 | Paper |
Preimage and pseudo-collision attacks on step-reduced SM3 hash function Information Processing Letters | 2013-06-28 | Paper |
Improved boomerang attacks on SM3 Information Security and Privacy | 2013-06-28 | Paper |
Distinguishing attacks on LPMAC based on the full RIPEMD and reduced-step RIPEMD-\(\{256,320\}\) Information Security and Cryptology | 2011-07-29 | Paper |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
The Delicate Issues of Addition with Respect to XOR Differences Selected Areas in Cryptography | 2008-03-25 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |