| Publication | Date of Publication | Type |
|---|
| Cryptanalysis of algebraic verifiable delay functions | 2024-12-13 | Paper |
| Truncated differential cryptanalysis: new insights and application to \texttt{QARMAv1}-\(n\) and \texttt{QARMAv2}-64 | 2024-12-11 | Paper |
| A generic algorithm for efficient key recovery in differential attacks -- and its associated tool | 2024-11-12 | Paper |
| Improved differential meet-in-the-middle cryptanalysis | 2024-11-12 | Paper |
| Quantum boomerang attacks and some applications | 2024-10-14 | Paper |
| Quantum impossible differential attacks: applications to AES and SKINNY | 2024-04-03 | Paper |
| Differential meet-in-the-middle cryptanalysis | 2024-02-02 | Paper |
| QCB: efficient quantum-secure authenticated encryption | 2023-05-12 | Paper |
| Quantum linearization attacks | 2023-05-12 | Paper |
| Generic framework for key-guessing improvements | 2023-05-12 | Paper |
| New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions | 2023-03-21 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Cryptanalysis results on spook. Bringing full-round shadow-512 to the light | 2022-12-07 | Paper |
| Improved differential-linear attacks with applications to ARX ciphers | 2022-11-14 | Paper |
| New attacks from old distinguishers improved attacks on serpent | 2022-07-06 | Paper |
| Optimal merging in quantum \(k\)-xor and \(k\)-sum algorithms | 2022-03-23 | Paper |
| Improving key-recovery in linear attacks: application to 28-round PRESENT | 2021-12-01 | Paper |
| Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} | 2021-11-24 | Paper |
| On quantum slide attacks | 2020-07-21 | Paper |
| Quantum attacks without superposition queries: the offline Simon's algorithm | 2020-05-20 | Paper |
| Hidden shift quantum cryptanalysis and implications | 2018-12-20 | Paper |
| Quantum algorithms for the \(k\)-XOR problem | 2018-12-20 | Paper |
| Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression | 2018-09-14 | Paper |
| Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression | 2018-05-09 | Paper |
| Making the impossible possible | 2018-04-26 | Paper |
| An efficient quantum collision search algorithm and implications on symmetric cryptography | 2018-03-08 | Paper |
| Parity-Check Relations on Combination Generators | 2017-07-12 | Paper |
| Breaking symmetric cryptosystems using quantum period finding | 2016-10-27 | Paper |
| Related-key attack on full-round PICARO | 2016-05-19 | Paper |
| Cryptanalysis of full sprout | 2015-12-10 | Paper |
| Multiple limited-birthday distinguishers and applications | 2015-10-01 | Paper |
| Cryptanalysis of KLEIN | 2015-09-18 | Paper |
| Multiple differential cryptanalysis of round-reduced \textsc{PRINCE} | 2015-09-18 | Paper |
| Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, Lblock and Simon | 2015-01-16 | Paper |
| Improved cryptanalysis of AES-like permutations | 2015-01-07 | Paper |
| Block ciphers that are easier to mask: how far can we go? | 2013-10-10 | Paper |
| Sieve-in-the-middle: improved MITM attacks | 2013-09-02 | Paper |
| Quark: a lightweight hash | 2013-06-27 | Paper |
| Correlation attacks on combination generators | 2013-06-24 | Paper |
| Improved rebound attack on the finalist Grøstl | 2013-01-08 | Paper |
| Practical cryptanalysis of ARMADILLO2 | 2013-01-08 | Paper |
| A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock | 2012-10-23 | Paper |
| Conditional Differential Cryptanalysis of Trivium and KATAN | 2012-06-08 | Paper |
| Improved analysis of ECHO-256 | 2012-06-08 | Paper |
| Practical Analysis of Reduced-Round Keccak | 2011-12-16 | Paper |
| Practical attack on 8 rounds of the lightweight block cipher KLEIN | 2011-12-16 | Paper |
| Rebound attack on JH42 | 2011-12-02 | Paper |
| Cryptanalysis of ARMADILLO2 | 2011-12-02 | Paper |
| How to improve rebound attacks | 2011-08-12 | Paper |
| Analysis of Reduced-SHAvite-3-256 v2 | 2011-07-07 | Paper |
| Cryptanalysis of Luffa v2 components | 2011-03-15 | Paper |
| Conditional differential cryptanalysis of NLFSR-based cryptosystems | 2010-12-07 | Paper |
| Quark: a lightweight hash | 2010-08-17 | Paper |
| Cryptanalysis of ESSENCE | 2010-07-13 | Paper |
| Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 | 2010-05-04 | Paper |
| Rebound attack on the full Lane compression function | 2009-12-15 | Paper |
| Inside the Hypercube | 2009-06-25 | Paper |
| Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation | 2009-01-22 | Paper |
| Cryptanalysis of Achterbahn-128/80 | 2008-09-16 | Paper |