| Publication | Date of Publication | Type |
|---|
| Time-space lower bounds for bounded-error computation in the random-query model | 2024-11-28 | Paper |
| Tight indistinguishability bounds for the XOR of independent random permutations by Fourier analysis | 2024-11-12 | Paper |
scientific article; zbMATH DE number 7829259 (Why is no real title available?) (available as arXiv preprint) | 2024-04-09 | Paper |
scientific article; zbMATH DE number 7788489 (Why is no real title available?) (available as arXiv preprint) | 2024-01-15 | Paper |
On differential privacy and adaptive data analysis with bounded space Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
| Distributed Merkle's puzzles | 2023-04-13 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Refined cryptanalysis of the GPRS ciphers GEA-1 and GEA-2 | 2022-08-30 | Paper |
| On the streaming indistinguishability of a random permutation and a random function | 2022-03-23 | Paper |
| Cryptanalytic applications of the polynomial method for solving multivariate equation systems over \(\mathrm{GF}(2)\) | 2021-12-08 | Paper |
| Tight time-space lower bounds for finding multiple collision pairs and their applications | 2021-12-01 | Paper |
Tight bounds on online checkpointing algorithms (available as arXiv preprint) | 2021-07-28 | Paper |
Tight Bounds on Online Checkpointing Algorithms ACM Transactions on Algorithms | 2021-05-03 | Paper |
An optimal distributed discrete log protocol with applications to homomorphic secret sharing Lecture Notes in Computer Science | 2020-06-30 | Paper |
Generic attacks on hash combiners Journal of Cryptology | 2020-06-15 | Paper |
Cryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problem Journal of Cryptology | 2020-06-15 | Paper |
An optimal distributed discrete log protocol with applications to homomorphic secret sharing Journal of Cryptology | 2020-06-15 | Paper |
| Linear equivalence of block ciphers with partial non-linear layers: application to LowMC | 2020-02-04 | Paper |
| Multi-target attacks on the Picnic signature scheme and related protocols | 2020-02-04 | Paper |
Efficient dissection of bicomposite problems with cryptanalytic applications Journal of Cryptology | 2019-11-27 | Paper |
An algorithmic framework for the generalized birthday problem Designs, Codes and Cryptography | 2019-06-27 | Paper |
| An improved affine equivalence algorithm for random permutations | 2018-07-09 | Paper |
Improved generic attacks against hash-based MACs and HAIFA Algorithmica | 2018-01-05 | Paper |
| Time-memory tradeoff attacks on the MTP proof-of-work scheme | 2017-11-15 | Paper |
WEM: a new family of white-box block ciphers based on the Even-Mansour construction Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Memory-Efficient Algorithms for Finding Needles in Haystacks Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Key recovery attacks on iterated Even-Mansour encryption schemes Journal of Cryptology | 2016-10-13 | Paper |
New attacks on the concatenation and XOR hash combiners Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Improved Differential Cryptanalysis of Round-Reduced Speck Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Optimized interpolation attacks on lowMC Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
New attacks on Feistel structures with improved memory complexities Lecture Notes in Computer Science | 2015-12-10 | Paper |
Reflections on slide with a twist attacks Designs, Codes and Cryptography | 2015-10-26 | Paper |
Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Cryptanalysis of SP networks with partial non-linear layers Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Improved linear sieving techniques with applications to step-reduced LED-64 Fast Software Encryption | 2015-09-18 | Paper |
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials Fast Software Encryption | 2015-09-18 | Paper |
Cryptanalysis of FIDES Fast Software Encryption | 2015-09-18 | Paper |
Improved top-down techniques in differential cryptanalysis Progress in Cryptology -- LATINCRYPT 2015 | 2015-09-17 | Paper |
Cryptanalysis of iterated Even-Mansour schemes with two keys Lecture Notes in Computer Science | 2015-01-16 | Paper |
Improved practical attacks on round-reduced Keccak Journal of Cryptology | 2014-09-25 | Paper |
Improved generic attacks against hash-based MACs and HAIFA Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2 Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Applying cube attacks to stream ciphers in realistic scenarios Cryptography and Communications | 2013-06-24 | Paper |
New attacks on Keccak-224 and Keccak-256 Fast Software Encryption | 2013-01-08 | Paper |
Improved Attacks on Full GOST Fast Software Encryption | 2013-01-08 | Paper |
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems Lecture Notes in Computer Science | 2012-09-25 | Paper |
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware Lecture Notes in Computer Science | 2011-12-02 | Paper |
An improved algebraic attack on Hamsi-256 Fast Software Encryption | 2011-07-07 | Paper |
Breaking Grain-128 with dynamic cube attacks Fast Software Encryption | 2011-07-07 | Paper |
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium Fast Software Encryption | 2009-08-11 | Paper |
Cube Attacks on Tweakable Black Box Polynomials Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Fine-Grained Cryptanalysis: Tight Conditional Bounds for Dense k-SUM and k-XOR (available as arXiv preprint) | N/A | Paper |