| Publication | Date of Publication | Type |
|---|
Differential attacks: using alternative operations Designs, Codes and Cryptography | 2019-02-20 | Paper |
Differential-linear cryptanalysis revisited Journal of Cryptology | 2017-10-12 | Paper |
Differential Properties of ${x\mapsto x^{2^{t}-1}}$ IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity Designs, Codes and Cryptography | 2017-02-10 | Paper |
Known-key distinguisher on full \(\mathtt{PRESENT}\) Lecture Notes in Computer Science | 2015-12-10 | Paper |
Differential-Linear Cryptanalysis Revisited Fast Software Encryption | 2015-09-18 | Paper |
Reflection Cryptanalysis of PRINCE-Like Ciphers Fast Software Encryption | 2015-09-18 | Paper |
Protecting against multidimensional linear and truncated differential cryptanalysis by decorrelation Fast Software Encryption | 2015-09-18 | Paper |
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method Fast Software Encryption | 2015-09-18 | Paper |
Reflection cryptanalysis of PRINCE-like ciphers Journal of Cryptology | 2015-08-03 | Paper |
Impossible differential attack on 13-round Camellia-192 Information Processing Letters | 2015-06-02 | Paper |
Perfect nonlinear functions and cryptography Finite Fields and their Applications | 2015-01-30 | Paper |
More differentially 6-uniform power functions Designs, Codes and Cryptography | 2014-08-18 | Paper |
On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers Applied Cryptography and Network Security | 2014-07-07 | Paper |
Links between truncated differential and multidimensional linear properties of block ciphers and underlying attack complexities Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Improbable differential from impossible differential: on the validity of the model Lecture Notes in Computer Science | 2014-01-14 | Paper |
Bounds in shallows and in miseries Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
New links between differential and linear cryptanalysis Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Multiple differential cryptanalysis using LLR and \(\chi^2\) statistics Lecture Notes in Computer Science | 2012-09-25 | Paper |
Cryptanalysis of ARMADILLO2 Lecture Notes in Computer Science | 2011-12-02 | Paper |
Multiple differential cryptanalysis: theory and practice Fast Software Encryption | 2011-07-07 | Paper |
Accurate estimates of the data complexity and success probability for various cryptanalyses Designs, Codes and Cryptography | 2011-04-08 | Paper |
Differential properties of power functions International Journal of Information and Coding Theory | 2011-02-04 | Paper |