| Publication | Date of Publication | Type |
|---|
| The COLM Authenticated Encryption Scheme | 2024-04-21 | Paper |
| Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure | 2024-03-14 | Paper |
| Higher-order DCA against standard side-channel countermeasures | 2023-10-20 | Paper |
| Troika: a ternary cryptographic hash function | 2020-01-09 | Paper |
| Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants | 2018-05-09 | Paper |
| Linear cryptanalysis of DES with asymmetries | 2018-04-06 | Paper |
| Hold your breath, PRIMATEs are lightweight | 2018-02-16 | Paper |
| SPONGENT: The Design Space of Lightweight Cryptographic Hashing | 2017-07-12 | Paper |
| Beyond the Limits of DPA: Combined Side-Channel Collision Attacks | 2017-07-12 | Paper |
| Towards practical whitebox cryptography: optimizing efficiency and space hardness | 2017-02-01 | Paper |
| Atomic-AES: a compact implementation of the AES encryption/decryption core | 2016-12-21 | Paper |
| Exploring energy efficiency of lightweight block ciphers | 2016-05-19 | Paper |
| Fast and memory-efficient key recovery in side-channel attacks | 2016-05-19 | Paper |
| \texttt{Midori}: a block cipher for low energy | 2016-03-23 | Paper |
| How secure is AES under leakage | 2016-03-23 | Paper |
| Cryptanalysis of two fault countermeasure schemes | 2016-01-12 | Paper |
| Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards Camellia and CLEFIA | 2015-10-01 | Paper |
| Twisted Polynomials and Forgery Attacks on GCM | 2015-09-30 | Paper |
| On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2 | 2015-09-18 | Paper |
| ALE: AES-based lightweight authenticated encryption | 2015-09-18 | Paper |
| Towards Understanding the Known-Key Security of Block Ciphers | 2015-09-18 | Paper |
| APE: authenticated permutation-based encryption for lightweight cryptography | 2015-09-18 | Paper |
| Comb to pipeline: fast software encryption revisited | 2015-09-18 | Paper |
| Key recovery attacks on recent authenticated ciphers | 2015-09-17 | Paper |
| Bicliques with minimal data and time complexity for AES | 2015-09-11 | Paper |
| General application of FFT in cryptanalysis and improved attack on CAST-256 | 2015-09-10 | Paper |
| Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis | 2015-06-17 | Paper |
| How to securely release unverified plaintext in authenticated encryption | 2015-01-16 | Paper |
| Towards the optimality of Feistel ciphers with substitution-permutation functions | 2014-08-18 | Paper |
| Route 66: passively breaking all GSM channels | 2014-07-24 | Paper |
| On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and skipjack-type ciphers | 2014-07-07 | Paper |
| Multidimensional zero-correlation linear cryptanalysis of E2 | 2014-06-24 | Paper |
| Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: improved cryptanalysis of an ISO standard | 2014-04-17 | Paper |
| Linear hulls with correlation zero and linear cryptanalysis of block ciphers | 2014-03-17 | Paper |
| Parallelizable and authenticated online ciphers | 2013-12-10 | Paper |
| Key difference invariant bias in block ciphers | 2013-12-10 | Paper |
| FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware | 2013-10-10 | Paper |
| On the indifferentiability of key-alternating ciphers | 2013-09-02 | Paper |
| Bounds in shallows and in miseries | 2013-09-02 | Paper |
| Improved impossible differential attacks on large-block Rijndael | 2013-06-04 | Paper |
| Analysis of \(3\)-line generalized Feistel networks with double SD-functions | 2013-04-04 | Paper |
| Integral and multidimensional linear distinguishers with correlation zero | 2013-03-19 | Paper |
| Generalized Feistel networks revisited | 2013-01-28 | Paper |
| Zero correlation linear cryptanalysis with reduced data complexity | 2013-01-08 | Paper |
| The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers | 2012-07-25 | Paper |
| Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract) | 2012-06-29 | Paper |
| Enumerating the \(k\)-tangle projections | 2012-04-30 | Paper |
| On the differential and linear efficiency of balanced Feistel networks | 2012-03-27 | Paper |
| Biclique Cryptanalysis of the Full AES | 2011-12-02 | Paper |
| Double SP-functions: enhanced generalized Feistel networks (extended abstract) | 2011-07-07 | Paper |
| On unbalanced feistel networks with contracting MDS diffusion | 2011-04-08 | Paper |
| A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN | 2011-03-15 | Paper |
| Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs | 2010-03-16 | Paper |
| Linear Slide Attacks on the KeeLoq Block Cipher | 2009-02-10 | Paper |
| Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection | 2009-01-22 | Paper |
| Hash Functions and RFID Tags: Mind the Gap | 2009-01-09 | Paper |
| PRESENT: An Ultra-Lightweight Block Cipher | 2008-09-16 | Paper |
| Improved Side-Channel Collision Attacks on AES | 2008-03-25 | Paper |
| Classification of $k$-tangle projections using cascade representation | 2007-12-22 | Paper |