| Publication | Date of Publication | Type |
|---|
| Generic MitM attack frameworks on sponge constructions | 2024-12-13 | Paper |
| Quantum attacks on hash constructions with low quantum random access memory | 2024-08-30 | Paper |
| Automated meet-in-the-middle attack goes to Feistel | 2024-08-30 | Paper |
| Quantum attacks: a view of data complexity on offline Simon's algorithm | 2024-07-19 | Paper |
| Improved differential attacks on GIFT-64 | 2024-04-19 | Paper |
Meet-in-the-middle preimage attacks on sponge-based hashing Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Improved attacks against reduced-round Whirlwind Designs, Codes and Cryptography | 2023-11-07 | Paper |
Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256} Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Triangulating rebound attack on AES-like hashing Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Preimage attacks on 4-round Keccak by solving multivariate quadratic systems | 2022-12-07 | Paper |
| Key guessing strategies for linear key-schedule algorithms in rectangle attacks | 2022-08-30 | Paper |
| Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks | 2022-04-22 | Paper |
| Automatic search of meet-in-the-middle preimage attacks on AES-like hashing | 2021-12-08 | Paper |
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT Designs, Codes and Cryptography | 2020-05-21 | Paper |
Quantum attacks on some Feistel block ciphers Designs, Codes and Cryptography | 2020-05-21 | Paper |
| Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 | 2020-05-12 | Paper |
| Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 | 2020-05-12 | Paper |
| MILP-based differential attack on round-reduced GIFT | 2020-01-28 | Paper |
MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes Designs, Codes and Cryptography | 2019-05-24 | Paper |
| A key-recovery attack on 855-round Trivium | 2018-09-26 | Paper |
Conditional cube attack on round-reduced River Keyak Designs, Codes and Cryptography | 2018-05-24 | Paper |
| Improved conditional cube attacks on Keccak keyed modes with MILP method | 2018-04-06 | Paper |
Mathematical models of nutrient recycling and toxin production in a gradostat Computers & Mathematics with Applications | 2017-05-31 | Paper |
Improved attacks on reduced-round Camellia-128/192/256 Lecture Notes in Computer Science | 2016-03-02 | Paper |
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia Fast Software Encryption | 2015-09-18 | Paper |