| Publication | Date of Publication | Type |
|---|
Indifferentiability of 3-round confusion-diffusion networks | 2025-01-10 | Paper |
Tight security of \textsf{TNT} and beyond. Attacks, proofs and possibilities for the cascaded \textsf{LRW} paradigm | 2024-11-12 | Paper |
Designing full-rate \textsf{Sponge} based AEAD modes | 2024-10-23 | Paper |
A sponge-based PRF with good multi-user security | 2024-10-16 | Paper |
Tight security analysis of the public permutation-based \(\mathsf{PMAC\_Plus} \) Advances in Mathematics of Communications | 2024-09-16 | Paper |
Exact security analysis of ASCON | 2024-08-30 | Paper |
Revisiting collision and local opening analysis of ABR hash | 2024-06-25 | Paper |
The COLM Authenticated Encryption Scheme Journal of Cryptology | 2024-04-21 | Paper |
Subversion Resilient Hashing: Efficient Constructions and Modular Proofs for Crooked Indifferentiability IEEE Transactions on Information Theory | 2024-03-19 | Paper |
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers Designs, Codes and Cryptography | 2024-01-15 | Paper |
Proof of mirror theory for a wide range of \(\xi_{\max }\) Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Indifferentiability of the confusion-diffusion network and the cascade block cipher Codes, Cryptology and Information Security | 2023-10-04 | Paper |
Towards tight security bounds for \textsf{OMAC, XCBC} and \textsf{TMAC} Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Offset-based BBB-secure tweakable block-ciphers with updatable caches Lecture Notes in Computer Science | 2023-08-14 | Paper |
\textsf{ISAP+}: \textsf{ISAP} with fast authentication Lecture Notes in Computer Science | 2023-08-14 | Paper |
T5: Hashing five inputs with three compression calls | 2023-07-03 | Paper |
\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher Lecture Notes in Computer Science | 2023-05-12 | Paper |
Luby-Rackoff backwards with more users and more security Lecture Notes in Computer Science | 2023-05-12 | Paper |
Fine-tuning the ISO/IEC standard \textsf{LightMAC} Lecture Notes in Computer Science | 2023-05-12 | Paper |
Revisiting the security of \textsf{COMET} authenticated encryption scheme Lecture Notes in Computer Science | 2023-05-12 | Paper |
\textsf{tHyENA}: making \textsf{HyENA} even smaller Lecture Notes in Computer Science | 2023-05-12 | Paper |
Crooked indifferentiability of enveloped XOR revisited Lecture Notes in Computer Science | 2023-05-12 | Paper |
How to build optimally secure PRFs using block ciphers | 2023-03-21 | Paper |
Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults? Security, Privacy, and Applied Cryptography Engineering | 2022-12-09 | Paper |
BBB secure nonce based MAC using public permutations Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
Proof of Mirror Theory for ξ max = 2 IEEE Transactions on Information Theory | 2022-10-11 | Paper |
Multi-user BBB security of public permutations based MAC Cryptography and Communications | 2022-10-06 | Paper |
\textsf{Light-OCB}: parallel lightweight authenticated cipher with full security | 2022-07-13 | Paper |
\(\mathsf{CENCPP}^\ast\): beyond-birthday-secure encryption from public permutations Designs, Codes and Cryptography | 2022-06-08 | Paper |
The \(\mathsf{mF}\) mode of authenticated encryption with associated data Journal of Mathematical Cryptology | 2022-02-28 | Paper |
Efficient fully CCA-secure predicate encryptions from pair encodings Advances in Mathematics of Communications | 2022-01-24 | Paper |
Mind the composition: birthday bound attacks on EWCDMD and SoKAC21 | 2021-12-01 | Paper |
Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff Designs, Codes and Cryptography | 2021-10-04 | Paper |
The Oribatida v1.3 family of lightweight authenticated encryption schemes Journal of Mathematical Cryptology | 2021-07-14 | Paper |
Delegation-based conversion from CPA to CCA-secure predicate encryption International Journal of Applied Cryptography | 2021-04-22 | Paper |
Blockcipher-based authenticated encryption: how small can we go? Lecture Notes in Computer Science | 2020-06-24 | Paper |
Blockcipher-based authenticated encryption: how small can we go? Journal of Cryptology | 2020-06-15 | Paper |
Tight security of cascaded LRW2 Journal of Cryptology | 2020-06-15 | Paper |
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing | 2020-03-02 | Paper |
Beyond birthday bound secure MAC in faulty nonce model | 2020-02-04 | Paper |
On Random Read Access in ${\mathsf{OCB}}$ IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Predicate signatures from pair encodings via dual system proof technique Journal of Mathematical Cryptology | 2019-11-28 | Paper |
\(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC Advances in Mathematics of Communications | 2019-09-19 | Paper |
Tweakable HCTR: a BBB secure tweakable enciphering scheme | 2019-03-29 | Paper |
On the optimality of non-linear computations for symmetric key primitives Journal of Mathematical Cryptology | 2019-01-11 | Paper |
Short variable length domain extenders with beyond birthday bound security | 2018-12-20 | Paper |
ZCZ -- achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls | 2018-12-20 | Paper |
Fault based almost universal forgeries on CLOC and SILC | 2018-10-26 | Paper |
Bernstein bound on WCS is tight -- repairing Luykx-Preneel optimal forgeries | 2018-09-26 | Paper |
Generic attacks against beyond-birthday-bound MACs | 2018-09-12 | Paper |
Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC | 2018-09-12 | Paper |
Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method | 2018-07-09 | Paper |
A New Look at Counters: Don’t Run Like Marathon in a Hundred Meter Race IEEE Transactions on Computers | 2018-06-27 | Paper |
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers Cryptography and Communications | 2018-05-28 | Paper |
A note on the chi-square method: a tool for proving cryptographic security Cryptography and Communications | 2018-05-28 | Paper |
Improved security for OCB3 | 2018-03-08 | Paper |
The iterated random function problem | 2018-03-08 | Paper |
TriviA: a fast and secure authenticated encryption scheme | 2018-02-14 | Paper |
Verifiability-based conversion from CPA to CCA-secure predicate encryption Applicable Algebra in Engineering, Communication and Computing | 2018-02-09 | Paper |
ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation IEEE Transactions on Computers | 2017-05-16 | Paper |
Attacks on the Authenticated Encryption Mode of Operation <italic>PAE</italic> IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Revisiting full-PRF-secure PMAC and using it for beyond-birthday authenticated encryption Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Revisiting structure graphs: applications to CBC-MAC and EMAC Journal of Mathematical Cryptology | 2016-12-07 | Paper |
On the security of joint signature and encryption revisited Journal of Mathematical Cryptology | 2016-12-07 | Paper |
One-key compression function based MAC with security beyond birthday bound Information Security and Privacy | 2016-08-31 | Paper |
INT-RUP Analysis of Block-cipher Based Authenticated Encryption Schemes Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
On the optimality of non-linear computations of length-preserving encryption schemes Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Equivalence between MAC, WCR and PRF for blockcipher based constructions Provable Security | 2015-09-29 | Paper |
On the Minimum Number of Multiplications Necessary for Universal Hash Functions Fast Software Encryption | 2015-09-18 | Paper |
Characterization of EME with linear mixing Advances in Information and Computer Security | 2015-05-27 | Paper |
Forging attacks on two authenticated encryption schemes COBRA and POET Lecture Notes in Computer Science | 2015-01-16 | Paper |
XLS is not a strong pseudorandom permutation Lecture Notes in Computer Science | 2015-01-16 | Paper |
Elme: a misuse resistant parallel authenticated encryption Information Security and Privacy | 2014-07-24 | Paper |
On the Security of Hash Functions Employing Blockcipher Postprocessing Fast Software Encryption | 2011-07-07 | Paper |
Speeding up the wide-pipe: secure and fast hashing Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Security analysis of the mode of JH hash function Fast Software Encryption | 2010-07-13 | Paper |
A unified method for improving PRF bounds for a class of blockcipher based MACs Fast Software Encryption | 2010-07-13 | Paper |
New parallel domain extenders for UOWHF Lecture Notes in Computer Science | 2010-01-05 | Paper |
Indifferentiability characterization of hash functions and optimal bounds of popular domain extensions Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Improved security analysis for OMAC as a pseudorandom function Journal of Mathematical Cryptology | 2009-10-09 | Paper |
Fast and Secure CBC-Type MAC Algorithms Fast Software Encryption | 2009-08-11 | Paper |
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security Information Security and Privacy | 2009-06-25 | Paper |
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Multicollision Attacks on Some Generalized Sequential Hash Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Improved security analysis of PMAC Journal of Mathematical Cryptology | 2008-11-07 | Paper |
An Improved Security Bound for HCTR Fast Software Encryption | 2008-09-18 | Paper |
Improved Indifferentiability Security Analysis of chopMD Hash Function Fast Software Encryption | 2008-09-18 | Paper |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
A Simple and Unified Method of Proving Indistinguishability Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
RC4-Hash: A New Hash Function Based on RC4 Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Towards Optimal Double-Length Hash Functions Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |