| Publication | Date of Publication | Type |
|---|
| The algebraic FreeLunch: efficient Gröbner basis attacks against arithmetization-oriented primitives | 2024-12-13 | Paper |
New design techniques for efficient arithmetization-oriented hash functions: \texttt{Anemoi} permutations and \texttt{Jive} compression mode Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
| New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions | 2023-03-21 | Paper |
On the algebraic degree of iterated power functions Designs, Codes and Cryptography | 2023-03-17 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Cryptanalysis results on spook. Bringing full-round shadow-512 to the light | 2022-12-07 | Paper |
| Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) | 2022-12-07 | Paper |
Constructing more quadratic APN functions with the QAM method Cryptography and Communications | 2022-11-11 | Paper |
Recovering or Testing Extended-Affine Equivalence IEEE Transactions on Information Theory | 2022-10-11 | Paper |
| Feistel structures for MPC, and more | 2022-08-25 | Paper |
A further study of quadratic APN permutations in dimension nine Finite Fields and their Applications | 2022-05-09 | Paper |
Trims and extensions of quadratic APN functions Designs, Codes and Cryptography | 2022-03-31 | Paper |
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} Journal of Cryptology | 2021-11-24 | Paper |
On subspaces of Kloosterman zeros and permutations of the form \(L_1(x^{-1})+L_2(x)\) (available as arXiv preprint) | 2021-10-04 | Paper |
Boomerang uniformity of popular S-box constructions Designs, Codes and Cryptography | 2020-09-22 | Paper |
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE Journal of Cryptology | 2020-06-15 | Paper |
| Anomalies and vector space search: tools for S-box analysis | 2020-05-20 | Paper |
If a generalised butterfly is APN then it operates on 6 bits Cryptography and Communications | 2020-05-12 | Paper |
On subspaces of Kloosterman zeros and permutations of the form $L_1(x^{-1})+L_2(x)$ (available as arXiv preprint) | 2020-03-31 | Paper |
On CCZ-equivalence, extended-affine equivalence, and function twisting Finite Fields and their Applications | 2019-03-27 | Paper |
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$ IEEE Transactions on Information Theory | 2018-06-27 | Paper |
Algebraic insights into the secret Feistel network Fast Software Encryption | 2018-05-09 | Paper |
| Symmetrically and asymmetrically hard cryptography | 2018-02-23 | Paper |
Design Strategies for ARX with Provable Bounds: Sparx and LAX Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1 Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Cryptanalysis of Feistel networks with secret round functions Lecture Notes in Computer Science | 2016-05-19 | Paper |
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure Lecture Notes in Computer Science | 2015-12-10 | Paper |
Differential analysis and meet-in-the-middle attack against round-reduced TWINE Fast Software Encryption | 2015-09-18 | Paper |
Meet-in-the-middle attacks and structural analysis of round-reduced PRINCE Fast Software Encryption | 2015-09-18 | Paper |
Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-64 Fast Software Encryption | 2015-09-18 | Paper |
More differentially 6-uniform power functions Designs, Codes and Cryptography | 2014-08-18 | Paper |