| Publication | Date of Publication | Type |
|---|
| Finding all impossible differentials when considering the DDT | 2024-10-16 | Paper |
| Revisiting higher-order differential-linear attacks from an algebraic perspective | 2024-08-30 | Paper |
| Fully automated differential-linear attacks against ARX ciphers | 2023-10-04 | Paper |
| DEFAULT: cipher level resistance against differential fault attack | 2023-05-12 | Paper |
| The MALICIOUS framework: embedding backdoors into tweakable block ciphers | 2022-12-07 | Paper |
| On the cost of ASIC hardware crackers: a SHA-1 case study | 2021-12-20 | Paper |
| A deeper look at machine learning-based cryptanalysis | 2021-12-08 | Paper |
| The \texttt{Deoxys} AEAD family | 2021-08-10 | Paper |
| GIFT: a small present. Towards reaching the limit of lightweight encryption | 2020-06-24 | Paper |
| Bit-sliding: a generic technique for bit-serial implementations of SPN-based primitives. Applications to AES, PRESENT and SKINNY | 2020-06-24 | Paper |
| From collisions to chosen-prefix collisions application to full SHA-1 | 2020-02-04 | Paper |
| Boomerang Connectivity Table: a new cryptanalysis tool | 2018-07-09 | Paper |
| Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption | 2018-04-26 | Paper |
| ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
| Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers | 2016-11-30 | Paper |
| The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS | 2016-10-27 | Paper |
| Cryptanalysis of full \texttt{RIPEMD-128} | 2016-10-13 | Paper |
| Freestart collision for full SHA-1 | 2016-09-09 | Paper |
| The usage of counter revisited: second-preimage attack on new Russian standardized hash function | 2016-04-13 | Paper |
| Collision attack on \({\mathtt Grindahl}\) | 2016-01-11 | Paper |
| Known-key distinguisher on full \(\mathtt{PRESENT}\) | 2015-12-10 | Paper |
| Practical free-start collision attacks on 76-step SHA-1 | 2015-12-10 | Paper |
| Multiple limited-birthday distinguishers and applications | 2015-10-01 | Paper |
| Implementing lightweight block ciphers on \texttt{x86} architectures | 2015-10-01 | Paper |
| Security analysis of \textsc{Prince} | 2015-09-18 | Paper |
| Lightweight MDS involution matrices | 2015-09-18 | Paper |
| Cryptanalysis of JAMBU | 2015-09-18 | Paper |
| A very compact FPGA implementation of LED and PHOTON | 2015-09-10 | Paper |
| FOAM: searching for hardware-optimal SPN structures and components with a fair comparison | 2015-07-21 | Paper |
| Improved cryptanalysis of AES-like permutations | 2015-01-07 | Paper |
| Tweaks and Keys for Block Ciphers: The TWEAKEY Framework | 2015-01-06 | Paper |
| Updates on generic attacks against HMAC and NMAC | 2014-08-07 | Paper |
| Generic universal forgery attack on iterative hash-based MACs | 2014-05-27 | Paper |
| Improved Cryptanalysis of Reduced RIPEMD-160 | 2013-12-10 | Paper |
| Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful | 2013-12-10 | Paper |
| New generic attacks against hash-based MACs | 2013-12-10 | Paper |
| Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128 | 2013-09-02 | Paper |
| Cryptanalysis of full RIPEMD-128 | 2013-05-31 | Paper |
| Generic Related-Key Attacks for HMAC | 2013-03-19 | Paper |
| On the (in)security of IDEA in various hashing modes | 2013-01-08 | Paper |
| Unaligned rebound attack: application to Keccak | 2013-01-08 | Paper |
| Improved rebound attack on the finalist Grøstl | 2013-01-08 | Paper |
| Practical cryptanalysis of ARMADILLO2 | 2013-01-08 | Paper |
| SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks | 2012-07-23 | Paper |
| The LED block cipher | 2011-10-07 | Paper |
| The PHOTON family of lightweight hash functions | 2011-08-12 | Paper |
| Analysis of Reduced-SHAvite-3-256 v2 | 2011-07-07 | Paper |
| A forward-secure symmetric-key derivation protocol. How to improve classical DUKPT | 2010-12-07 | Paper |
| Cryptanalysis of the ESSENCE family of hash functions | 2010-11-23 | Paper |
| Distinguishers for the compression function and output transformation of Hamsi-256 | 2010-10-25 | Paper |
| Improved differential attacks for ECHO and Grøstl | 2010-08-24 | Paper |
| Side-channel analysis of six SHA-3 candidates | 2010-08-17 | Paper |
| Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations | 2010-07-13 | Paper |
| Cryptanalysis of ESSENCE | 2010-07-13 | Paper |
| Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 | 2010-05-04 | Paper |
| Linearization framework for collision attacks: application to CubeHash and MD6 | 2009-12-15 | Paper |
| Improved cryptanalysis of the reduced Grøstl compression function, ECHO permutation and AES block cipher | 2009-12-09 | Paper |
| Cryptanalysis of RadioGatún | 2009-08-11 | Paper |
| Inside the Hypercube | 2009-06-25 | Paper |
| Hash Functions and the (Amplified) Boomerang Attack | 2009-03-10 | Paper |
| On Building Hash Functions from Multivariate Quadratic Equations | 2009-03-06 | Paper |
| Slide Attacks on a Class of Hash Functions | 2009-02-10 | Paper |
| How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions | 2009-01-27 | Paper |
| Collisions on SHA-0 in One Hour | 2008-09-18 | Paper |
| Security Analysis of Constructions Combining FIL Random Oracles | 2008-09-16 | Paper |
| Cryptanalysis of FORK-256 | 2008-09-16 | Paper |
| Cryptanalysis of Grindahl | 2008-05-15 | Paper |
| Cryptanalysis of T-Function-Based Hash Functions | 2008-05-06 | Paper |
| Combining Compression Functions and Block Cipher-Based Hash Functions | 2008-04-24 | Paper |
| Linear Cryptanalysis of the TSC Family of Stream Ciphers | 2008-03-18 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |