| Publication | Date of Publication | Type |
|---|
The state-test technique on differential attacks: a 26-round attack on Craft and other applications | 2026-03-31 | Paper |
Cryptanalysis of algebraic verifiable delay functions | 2024-12-13 | Paper |
Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-64 Designs, Codes and Cryptography | 2024-12-11 | Paper |
A generic algorithm for efficient key recovery in differential attacks -- and its associated tool | 2024-11-12 | Paper |
Improved differential meet-in-the-middle cryptanalysis | 2024-11-12 | Paper |
Quantum boomerang attacks and some applications | 2024-10-14 | Paper |
Quantum impossible differential attacks: applications to AES and SKINNY Designs, Codes and Cryptography | 2024-04-03 | Paper |
Differential meet-in-the-middle cryptanalysis Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
QCB: efficient quantum-secure authenticated encryption Lecture Notes in Computer Science | 2023-05-12 | Paper |
Quantum linearization attacks Lecture Notes in Computer Science | 2023-05-12 | Paper |
Generic framework for key-guessing improvements Lecture Notes in Computer Science | 2023-05-12 | Paper |
New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions | 2023-03-21 | Paper |
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
Cryptanalysis results on spook. Bringing full-round shadow-512 to the light | 2022-12-07 | Paper |
Improved differential-linear attacks with applications to ARX ciphers Journal of Cryptology | 2022-11-14 | Paper |
New attacks from old distinguishers improved attacks on serpent | 2022-07-06 | Paper |
Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms | 2022-03-23 | Paper |
Improving key-recovery in linear attacks: application to 28-round PRESENT | 2021-12-01 | Paper |
Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} Journal of Cryptology | 2021-11-24 | Paper |
On quantum slide attacks | 2020-07-21 | Paper |
Quantum attacks without superposition queries: the offline Simon's algorithm | 2020-05-20 | Paper |
Hidden shift quantum cryptanalysis and implications | 2018-12-20 | Paper |
Quantum algorithms for the \(k\)-XOR problem | 2018-12-20 | Paper |
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression Journal of Cryptology | 2018-09-14 | Paper |
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression Fast Software Encryption | 2018-05-09 | Paper |
Making the impossible possible Journal of Cryptology | 2018-04-26 | Paper |
An efficient quantum collision search algorithm and implications on symmetric cryptography | 2018-03-08 | Paper |
Parity-Check Relations on Combination Generators IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Breaking symmetric cryptosystems using quantum period finding Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Related-key attack on full-round PICARO Lecture Notes in Computer Science | 2016-05-19 | Paper |
Cryptanalysis of full sprout Lecture Notes in Computer Science | 2015-12-10 | Paper |
Multiple limited-birthday distinguishers and applications Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Cryptanalysis of KLEIN Fast Software Encryption | 2015-09-18 | Paper |
Multiple differential cryptanalysis of round-reduced \textsc{PRINCE} Fast Software Encryption | 2015-09-18 | Paper |
Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon Lecture Notes in Computer Science | 2015-01-16 | Paper |
Improved cryptanalysis of AES-like permutations Journal of Cryptology | 2015-01-07 | Paper |
Block ciphers that are easier to mask: how far can we go? Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Sieve-in-the-middle: improved MITM attacks Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Quark: a lightweight hash Journal of Cryptology | 2013-06-27 | Paper |
Correlation attacks on combination generators Cryptography and Communications | 2013-06-24 | Paper |
Improved rebound attack on the finalist Grøstl Fast Software Encryption | 2013-01-08 | Paper |
Practical cryptanalysis of ARMADILLO2 Fast Software Encryption | 2013-01-08 | Paper |
A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock Information Processing Letters | 2012-10-23 | Paper |
Conditional Differential Cryptanalysis of Trivium and KATAN Selected Areas in Cryptography | 2012-06-08 | Paper |
Improved analysis of ECHO-256 Selected Areas in Cryptography | 2012-06-08 | Paper |
Practical Analysis of Reduced-Round Keccak Lecture Notes in Computer Science | 2011-12-16 | Paper |
Practical attack on 8 rounds of the lightweight block cipher KLEIN Lecture Notes in Computer Science | 2011-12-16 | Paper |
Rebound attack on JH42 Lecture Notes in Computer Science | 2011-12-02 | Paper |
Cryptanalysis of ARMADILLO2 Lecture Notes in Computer Science | 2011-12-02 | Paper |
How to improve rebound attacks Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
Analysis of Reduced-SHAvite-3-256 v2 Fast Software Encryption | 2011-07-07 | Paper |
Cryptanalysis of Luffa v2 components Selected Areas in Cryptography | 2011-03-15 | Paper |
Conditional differential cryptanalysis of NLFSR-based cryptosystems Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Quark: a lightweight hash Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
Cryptanalysis of ESSENCE Fast Software Encryption | 2010-07-13 | Paper |
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Rebound attack on the full Lane compression function Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Inside the Hypercube Information Security and Privacy | 2009-06-25 | Paper |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation Research in Cryptology | 2009-01-22 | Paper |
Cryptanalysis of Achterbahn-128/80 Fast Software Encryption | 2008-09-16 | Paper |