Publication | Date of Publication | Type |
---|
Fully automated differential-linear attacks against ARX ciphers | 2023-10-04 | Paper |
DEFAULT: cipher level resistance against differential fault attack | 2023-05-12 | Paper |
The MALICIOUS framework: embedding backdoors into tweakable block ciphers | 2022-12-07 | Paper |
On the cost of ASIC hardware crackers: a SHA-1 case study | 2021-12-20 | Paper |
A deeper look at machine learning-based cryptanalysis | 2021-12-08 | Paper |
The \texttt{Deoxys} AEAD family | 2021-08-10 | Paper |
GIFT: A Small Present | 2020-06-24 | Paper |
Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives | 2020-06-24 | Paper |
From collisions to chosen-prefix collisions application to full SHA-1 | 2020-02-04 | Paper |
Boomerang Connectivity Table: a new cryptanalysis tool | 2018-07-09 | Paper |
Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption | 2018-04-26 | Paper |
ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers | 2016-11-30 | Paper |
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS | 2016-10-27 | Paper |
Cryptanalysis of full \texttt{RIPEMD-128} | 2016-10-13 | Paper |
Freestart Collision for Full SHA-1 | 2016-09-09 | Paper |
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function | 2016-04-13 | Paper |
Collision attack on \({\mathtt Grindahl}\) | 2016-01-11 | Paper |
Known-Key Distinguisher on Full PRESENT | 2015-12-10 | Paper |
Practical Free-Start Collision Attacks on 76-step SHA-1 | 2015-12-10 | Paper |
Implementing Lightweight Block Ciphers on x86 Architectures | 2015-10-01 | Paper |
Multiple Limited-Birthday Distinguishers and Applications | 2015-10-01 | Paper |
Security Analysis of PRINCE | 2015-09-18 | Paper |
Cryptanalysis of JAMBU | 2015-09-18 | Paper |
Lightweight MDS Involution Matrices | 2015-09-18 | Paper |
A Very Compact FPGA Implementation of LED and PHOTON | 2015-09-10 | Paper |
FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison | 2015-07-21 | Paper |
Improved cryptanalysis of AES-like permutations | 2015-01-07 | Paper |
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework | 2015-01-06 | Paper |
Updates on Generic Attacks against HMAC and NMAC | 2014-08-07 | Paper |
Generic Universal Forgery Attack on Iterative Hash-Based MACs | 2014-05-27 | Paper |
New Generic Attacks against Hash-Based MACs | 2013-12-10 | Paper |
Improved Cryptanalysis of Reduced RIPEMD-160 | 2013-12-10 | Paper |
Limited-Birthday Distinguishers for Hash Functions | 2013-12-10 | Paper |
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 | 2013-09-02 | Paper |
Cryptanalysis of Full RIPEMD-128 | 2013-05-31 | Paper |
Generic Related-Key Attacks for HMAC | 2013-03-19 | Paper |
Improved Rebound Attack on the Finalist Grøstl | 2013-01-08 | Paper |
Practical Cryptanalysis of ARMADILLO2 | 2013-01-08 | Paper |
On the (In)Security of IDEA in Various Hashing Modes | 2013-01-08 | Paper |
Unaligned Rebound Attack: Application to Keccak | 2013-01-08 | Paper |
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks | 2012-07-23 | Paper |
The LED Block Cipher | 2011-10-07 | Paper |
The PHOTON Family of Lightweight Hash Functions | 2011-08-12 | Paper |
Analysis of Reduced-SHAvite-3-256 v2 | 2011-07-07 | Paper |
A Forward-Secure Symmetric-Key Derivation Protocol | 2010-12-07 | Paper |
Cryptanalysis of the ESSENCE Family of Hash Functions | 2010-11-23 | Paper |
Distinguishers for the Compression Function and Output Transformation of Hamsi-256 | 2010-10-25 | Paper |
Improved Differential Attacks for ECHO and Grøstl | 2010-08-24 | Paper |
Side-Channel Analysis of Six SHA-3 Candidates | 2010-08-17 | Paper |
Cryptanalysis of ESSENCE | 2010-07-13 | Paper |
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations | 2010-07-13 | Paper |
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 | 2010-05-04 | Paper |
Linearization Framework for Collision Attacks: Application to CubeHash and MD6 | 2009-12-15 | Paper |
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher | 2009-12-09 | Paper |
Cryptanalysis of RadioGatún | 2009-08-11 | Paper |
Inside the Hypercube | 2009-06-25 | Paper |
Hash Functions and the (Amplified) Boomerang Attack | 2009-03-10 | Paper |
On Building Hash Functions from Multivariate Quadratic Equations | 2009-03-06 | Paper |
Slide Attacks on a Class of Hash Functions | 2009-02-10 | Paper |
How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions | 2009-01-27 | Paper |
Collisions on SHA-0 in One Hour | 2008-09-18 | Paper |
Cryptanalysis of FORK-256 | 2008-09-16 | Paper |
Security Analysis of Constructions Combining FIL Random Oracles | 2008-09-16 | Paper |
Cryptanalysis of Grindahl | 2008-05-15 | Paper |
Cryptanalysis of T-Function-Based Hash Functions | 2008-05-06 | Paper |
Combining Compression Functions and Block Cipher-Based Hash Functions | 2008-04-24 | Paper |
Linear Cryptanalysis of the TSC Family of Stream Ciphers | 2008-03-18 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |