| Publication | Date of Publication | Type |
|---|
| Cryptanalysis of algebraic verifiable delay functions | 2024-12-13 | Paper |
| Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-64 | 2024-12-11 | Paper |
| A generic algorithm for efficient key recovery in differential attacks -- and its associated tool | 2024-11-12 | Paper |
| Improved differential meet-in-the-middle cryptanalysis | 2024-11-12 | Paper |
| Quantum boomerang attacks and some applications | 2024-10-14 | Paper |
| Quantum impossible differential attacks: applications to AES and SKINNY | 2024-04-03 | Paper |
| Differential meet-in-the-middle cryptanalysis | 2024-02-02 | Paper |
| QCB: efficient quantum-secure authenticated encryption | 2023-05-12 | Paper |
| Quantum linearization attacks | 2023-05-12 | Paper |
| Generic framework for key-guessing improvements | 2023-05-12 | Paper |
| New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions | 2023-03-21 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Cryptanalysis results on spook. Bringing full-round shadow-512 to the light | 2022-12-07 | Paper |
| Improved differential-linear attacks with applications to ARX ciphers | 2022-11-14 | Paper |
| New attacks from old distinguishers improved attacks on serpent | 2022-07-06 | Paper |
| Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms | 2022-03-23 | Paper |
| Improving key-recovery in linear attacks: application to 28-round PRESENT | 2021-12-01 | Paper |
| Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} | 2021-11-24 | Paper |
| On quantum slide attacks | 2020-07-21 | Paper |
| Quantum attacks without superposition queries: the offline Simon's algorithm | 2020-05-20 | Paper |
| Hidden shift quantum cryptanalysis and implications | 2018-12-20 | Paper |
| Quantum algorithms for the \(k\)-XOR problem | 2018-12-20 | Paper |
| Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression | 2018-09-14 | Paper |
| Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression | 2018-05-09 | Paper |
| Making the impossible possible | 2018-04-26 | Paper |
| An efficient quantum collision search algorithm and implications on symmetric cryptography | 2018-03-08 | Paper |
| Parity-Check Relations on Combination Generators | 2017-07-12 | Paper |
| Breaking Symmetric Cryptosystems Using Quantum Period Finding | 2016-10-27 | Paper |
| Related-Key Attack on Full-Round PICARO | 2016-05-19 | Paper |
| Cryptanalysis of Full Sprout | 2015-12-10 | Paper |
| Multiple Limited-Birthday Distinguishers and Applications | 2015-10-01 | Paper |
| Cryptanalysis of KLEIN | 2015-09-18 | Paper |
| Multiple Differential Cryptanalysis of Round-Reduced PRINCE | 2015-09-18 | Paper |
| Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon | 2015-01-16 | Paper |
| Improved cryptanalysis of AES-like permutations | 2015-01-07 | Paper |
| Block Ciphers That Are Easier to Mask: How Far Can We Go? | 2013-10-10 | Paper |
| Sieve-in-the-Middle: Improved MITM Attacks | 2013-09-02 | Paper |
| Quark: a lightweight hash | 2013-06-27 | Paper |
| Correlation attacks on combination generators | 2013-06-24 | Paper |
| Improved Rebound Attack on the Finalist Grøstl | 2013-01-08 | Paper |
| Practical Cryptanalysis of ARMADILLO2 | 2013-01-08 | Paper |
| A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock | 2012-10-23 | Paper |
| Conditional Differential Cryptanalysis of Trivium and KATAN | 2012-06-08 | Paper |
| Improved Analysis of ECHO-256 | 2012-06-08 | Paper |
| Practical Analysis of Reduced-Round Keccak | 2011-12-16 | Paper |
| Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN | 2011-12-16 | Paper |
| Rebound Attack on JH42 | 2011-12-02 | Paper |
| Cryptanalysis of ARMADILLO2 | 2011-12-02 | Paper |
| How to Improve Rebound Attacks | 2011-08-12 | Paper |
| Analysis of Reduced-SHAvite-3-256 v2 | 2011-07-07 | Paper |
| Cryptanalysis of Luffa v2 Components | 2011-03-15 | Paper |
| Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems | 2010-12-07 | Paper |
| Quark: a lightweight hash | 2010-08-17 | Paper |
| Cryptanalysis of ESSENCE | 2010-07-13 | Paper |
| Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 | 2010-05-04 | Paper |
| Rebound attack on the full Lane compression function | 2009-12-15 | Paper |
| Inside the Hypercube | 2009-06-25 | Paper |
| Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation | 2009-01-22 | Paper |
| Cryptanalysis of Achterbahn-128/80 | 2008-09-16 | Paper |