| Publication | Date of Publication | Type |
|---|
Differential-linear attacks from new distinguishers. The case of serpent and present Designs, Codes and Cryptography | 2026-02-11 | Paper |
Flatness and structural analysis for the design of stream ciphers involving hybrid automata Nonlinear Analysis. Hybrid Systems | 2024-06-07 | Paper |
Automatic boomerang attacks search on Rijndael Journal of Mathematical Cryptology | 2024-03-16 | Paper |
And Rijndael? Automatic related-key differential analysis of Rijndael Progress in Cryptology - AFRICACRYPT 2022 | 2023-06-02 | Paper |
Non-Triangular Self-Synchronizing Stream Ciphers IEEE Transactions on Computers | 2022-03-24 | Paper |
Computing AES related-key differential characteristics with constraint programming Artificial Intelligence | 2020-01-20 | Paper |
Revisiting AES related-key differential attacks with constraint programming Information Processing Letters | 2018-10-19 | Paper |
| Tuple cryptanalysis: slicing and fusing multisets | 2017-10-23 | Paper |
Revisiting LFSRs for Cryptographic Applications IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Extended Generalized Feistel Networks Using Matrix Representation to Propose a New Lightweight Block Cipher: <sc>Lilliput</sc> IEEE Transactions on Computers | 2017-05-16 | Paper |
Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 Designs, Codes and Cryptography | 2017-02-10 | Paper |
Some results using the matrix methods on impossible, integral and zero-correlation distinguishers for Feistel-like ciphers Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Extended generalized Feistel networks using matrix representation Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
CUBE cipher: a family of quasi-involutive block ciphers easy to mask Lecture Notes in Computer Science | 2015-09-21 | Paper |
Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method Fast Software Encryption | 2015-09-18 | Paper |
Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs Lecture Notes in Computer Science | 2014-08-20 | Paper |
On the security of Piccolo lightweight block cipher against related-key impossible differentials Lecture Notes in Computer Science | 2014-01-14 | Paper |
An integral distinguisher on Grøstl-512 v3 Lecture Notes in Computer Science | 2014-01-14 | Paper |
On Integral Distinguishers of Rijndael Family of Ciphers Cryptologia | 2013-03-21 | Paper |
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock Information Processing Letters | 2012-10-23 | Paper |
The GLUON family: a lightweight hash function family based on FCSRs Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Analysis of Reduced-SHAvite-3-256 v2 Fast Software Encryption | 2011-07-07 | Paper |
Integral distinguishers of some SHA-3 candidates Cryptology and Network Security | 2010-12-07 | Paper |
Software oriented stream ciphers based upon FCSRs in diversified mode Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Oblivious multi-variate polynomial evaluation Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
A new approach for FCSRs Selected Areas in Cryptography | 2009-12-09 | Paper |
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Some Results on FCSR Automata With Applications to the Security of FCSR-Based Pseudorandom Generators IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs Lecture Notes in Computer Science | 2008-04-11 | Paper |
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
New Results on the Pseudorandomness of Some Blockcipher Constructions Fast Software Encryption | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2086713 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 1759266 (Why is no real title available?) | 2002-11-24 | Paper |