| Publication | Date of Publication | Type |
|---|
QCB: efficient quantum-secure authenticated encryption Lecture Notes in Computer Science | 2023-05-12 | Paper |
| MuSig2: simple two-round Schnorr multi-signatures | 2022-03-31 | Paper |
| Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model | 2022-03-23 | Paper |
| The key-dependent message security of key-alternating Feistel ciphers | 2021-12-20 | Paper |
The \texttt{Deoxys} AEAD family Journal of Cryptology | 2021-08-10 | Paper |
Simple Schnorr multi-signatures with applications to bitcoin Designs, Codes and Cryptography | 2019-09-12 | Paper |
Minimizing the two-round Even-Mansour cipher Journal of Cryptology | 2018-11-01 | Paper |
Analysis of the single-permutation encrypted Davies-Meyer construction Designs, Codes and Cryptography | 2018-10-26 | Paper |
Strengthening the known-key security notion for block ciphers Fast Software Encryption | 2018-05-09 | Paper |
| ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
| Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: five rounds are necessary and sufficient | 2017-10-27 | Paper |
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Security amplification for the composition of block ciphers: simpler proofs and new results Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
How to build an ideal cipher: the indifferentiability of the Feistel construction Journal of Cryptology | 2016-04-07 | Paper |
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
The iterated random permutation problem with applications to cascade encryption Lecture Notes in Computer Science | 2015-12-10 | Paper |
Tweaking Even-Mansour ciphers Lecture Notes in Computer Science | 2015-12-10 | Paper |
On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Security analysis of key-alternating Feistel ciphers Fast Software Encryption | 2015-09-18 | Paper |
Tweakable blockciphers with asymptotically optimal security Fast Software Encryption | 2015-09-18 | Paper |
Relaxing full-codebook security: a refined analysis of key-length extension schemes Fast Software Encryption | 2015-09-18 | Paper |
Minimizing the two-round Even-Mansour cipher Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
On the lossiness of the Rabin trapdoor function Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
How to construct an ideal cipher from a small set of public permutations Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
New Constructions and Applications of Trapdoor DDH Groups Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
An asymptotically tight security analysis of the iterated Even-Mansour cipher Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
A robust and plaintext-aware variant of signed ElGamal encryption Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
On the exact security of Schnorr-type signatures in the random oracle model Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
On the public indifferentiability and correlation intractability of the 6-round Feistel construction Theory of Cryptography | 2012-06-15 | Paper |
A domain extender for the ideal cipher Theory of Cryptography | 2010-02-24 | Paper |
Building Secure Block Ciphers on Generic Attacks Assumptions Selected Areas in Cryptography | 2009-11-03 | Paper |
Good Variants of HB + Are Hard to Find Financial Cryptography and Data Security | 2009-02-12 | Paper |
The Random Oracle Model and the Ideal Cipher Model Are Equivalent Lecture Notes in Computer Science | 2009-02-10 | Paper |
Hash Functions and RFID Tags: Mind the Gap Cryptographic Hardware and Embedded Systems – CHES 2008 | 2009-01-09 | Paper |
PRESENT: An Ultra-Lightweight Block Cipher Cryptographic Hardware and Embedded Systems - CHES 2007 | 2008-09-16 | Paper |
Security Analysis of Constructions Combining FIL Random Oracles Fast Software Encryption | 2008-09-16 | Paper |
How to Encrypt with the LPN Problem Automata, Languages and Programming | 2008-08-19 | Paper |
Looking Back at a New Hash Function Information Security and Privacy | 2008-07-08 | Paper |
: Increasing the Security and Efficiency of Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |