| Publication | Date of Publication | Type |
|---|
Improved semi-free-start collision attacks on RIPEMD-160 | 2026-03-31 | Paper |
Improved linear key recovery attacks on PRESENT IEEE Transactions on Information Theory | 2025-01-23 | Paper |
Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations | 2024-12-13 | Paper |
Moment-based distributionally robust joint chance constrained optimization for service network design under demand uncertainty Optimization and Engineering | 2024-11-18 | Paper |
Massive superpoly recovery with a meet-in-the-middle framework. Improved cube attacks on \textsc{Trivium} and Kreyvium | 2024-11-12 | Paper |
Key-recovery attacks on \texttt{CRAFT} and \texttt{WARP} | 2024-10-16 | Paper |
Finding all impossible differentials when considering the DDT | 2024-10-16 | Paper |
More balanced polynomials: cube attacks on 810- and 825-round Trivium with practical complexities | 2024-10-16 | Paper |
Probabilistic related-key statistical saturation cryptanalysis | 2024-10-16 | Paper |
Improved attacks on \texttt{GIFT-64} | 2024-10-14 | Paper |
Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES} | 2024-10-14 | Paper |
Improved quantum circuits for AES: reducing the depth and the number of qubits | 2024-08-30 | Paper |
Full round distinguishing and key-recovery attacks on SAND-2 | 2024-07-19 | Paper |
Exact values and improved bounds on \(k\)-neighborly families of boxes European Journal of Combinatorics | 2024-03-26 | Paper |
From unbalanced to perfect: implementation of low energy stream ciphers Progress in Cryptology - AFRICACRYPT 2023 | 2024-02-02 | Paper |
Linear cryptanalysis and its variants with fast Fourier transformation technique on MPC/FHE/ZK-friendly \(\mathbb{F}_p\)-based ciphers | 2024-01-11 | Paper |
Cryptanalysis of \texttt{SPEEDY} | 2024-01-11 | Paper |
Improved heuristics for low-latency implementations of linear layers Topics in Cryptology – CT-RSA 2023 | 2023-10-04 | Paper |
On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Stretching cube attacks: improved methods to recover massive superpolies Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
How fast can SM4 be in software? Information Security and Cryptology | 2023-08-21 | Paper |
Improved truncated differential distinguishers of AES with concrete S-box Lecture Notes in Computer Science | 2023-08-14 | Paper |
Automated key recovery attacks on round-reduced Orthros Progress in Cryptology - AFRICACRYPT 2022 | 2023-06-02 | Paper |
Pushing the limits: searching for implementations with the smallest area for lightweight S-boxes Lecture Notes in Computer Science | 2023-05-12 | Paper |
Massive superpoly recovery with nested monomial predictions Lecture Notes in Computer Science | 2023-05-12 | Paper |
Forced Independent Optimized Implementation of 4-Bit S-Box | 2023-04-13 | Paper |
An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums | 2023-03-21 | Paper |
MixColumns coefficient property and security of the AES with a secret S-Box Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
Differential-algebraic cryptanalysis of reduced-round of Serpent-256 Science China Information Sciences | 2022-10-28 | Paper |
A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis | 2022-08-30 | Paper |
Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 | 2022-07-06 | Paper |
Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 | 2022-07-06 | Paper |
Cryptanalysis of the AEAD and hash algorithm DryGASCON Cryptography and Communications | 2022-06-13 | Paper |
An STP-based model toward designing S-boxes with good cryptographic properties Designs, Codes and Cryptography | 2022-04-28 | Paper |
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications Cryptography and Communications | 2022-04-01 | Paper |
A column generation tailored to electric vehicle routing problem with nonlinear battery depreciation Computers & Operations Research | 2022-03-09 | Paper |
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations Designs, Codes and Cryptography | 2022-01-19 | Paper |
Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys | 2021-12-20 | Paper |
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC Information Processing Letters | 2021-06-16 | Paper |
Universal forgery attack against GCM-RUP | 2020-08-05 | Paper |
Distinguisher on full-round compression function of GOST R Information Processing Letters | 2020-02-11 | Paper |
Automatic search for a variant of division property using three subsets | 2020-01-28 | Paper |
Cryptanalysis of MORUS Designs, Codes and Cryptography | 2019-05-17 | Paper |
scientific article; zbMATH DE number 7028909 (Why is no real title available?) | 2019-02-22 | Paper |
Towards key-dependent integral and impossible differential distinguishers on 5-round AES | 2019-02-20 | Paper |
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis | 2018-10-18 | Paper |
Zero-correlation attacks: statistical models independent of the number of approximations Designs, Codes and Cryptography | 2018-07-13 | Paper |
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers Cryptography and Communications | 2018-05-28 | Paper |
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants Fast Software Encryption | 2018-05-09 | Paper |
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck Fast Software Encryption | 2018-05-09 | Paper |
Automatic search of bit-based division property for ARX ciphers and word-based division property | 2018-04-06 | Paper |
Statistical integral attack on CAST-256 and IDEA Cryptography and Communications | 2018-01-29 | Paper |
Statistical integral distinguisher with multi-structure and its application on AES | 2017-08-25 | Paper |
Conditional cube attack on reduced-round Keccak sponge function Lecture Notes in Computer Science | 2017-06-13 | Paper |
Improved Differential Cryptanalysis of CAST-128 and CAST-256 Information Security and Cryptology | 2017-05-05 | Paper |
Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using \(\chi^2\)-method Designs, Codes and Cryptography | 2016-10-21 | Paper |
Elasticity solutions for orthotropic functionally graded curved beams European Journal of Mechanics. A. Solids | 2016-10-17 | Paper |
Improved Zero-Correlation Cryptanalysis on SIMON Information Security and Cryptology | 2016-07-25 | Paper |
Linear cryptanalysis of reduced-round SPECK Information Processing Letters | 2016-01-05 | Paper |
Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds Fast Software Encryption | 2015-09-18 | Paper |
General application of FFT in cryptanalysis and improved attack on CAST-256 Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2 Information Security and Privacy | 2014-07-24 | Paper |
On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers Applied Cryptography and Network Security | 2014-07-07 | Paper |
Multidimensional zero-correlation linear cryptanalysis of E2 Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard Information Processing Letters | 2014-04-17 | Paper |
Key difference invariant bias in block ciphers Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
New impossible differential attack on SAFER\(_{+}\) and SAFER\(_{++}\) Lecture Notes in Computer Science | 2013-06-04 | Paper |
Integral and multidimensional linear distinguishers with correlation zero Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Zero correlation linear cryptanalysis with reduced data complexity Fast Software Encryption | 2013-01-08 | Paper |
A model for structure attacks, with applications to PRESENT and Serpent Fast Software Encryption | 2013-01-08 | Paper |
Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Differential cryptanalysis of reduced-round ICEBERG Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Linear cryptanalysis of reduced-round ICEBERG Information Security Practice and Experience | 2012-06-29 | Paper |
Practical attack on the full MMB block cipher Selected Areas in Cryptography | 2012-06-08 | Paper |
Algebraic techniques in differential cryptanalysis revisited Information Security and Privacy | 2011-07-07 | Paper |
scientific article; zbMATH DE number 5830796 (Why is no real title available?) | 2011-01-03 | Paper |
Cryptanalysis of the full MMB block cipher Selected Areas in Cryptography | 2009-12-09 | Paper |
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT Cryptology and Network Security | 2009-11-26 | Paper |
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 Selected Areas in Cryptography | 2009-11-03 | Paper |
New Distinguishing Attack on MAC Using Secret-Prefix Method Fast Software Encryption | 2009-08-11 | Paper |
scientific article; zbMATH DE number 5582954 (Why is no real title available?) | 2009-07-22 | Paper |
Differential Cryptanalysis of Reduced-Round PRESENT Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
scientific article; zbMATH DE number 4143767 (Why is no real title available?) | 1989-01-01 | Paper |
scientific article; zbMATH DE number 3855693 (Why is no real title available?) | 1984-01-01 | Paper |
scientific article; zbMATH DE number 3826451 (Why is no real title available?) | 1984-01-01 | Paper |