| Publication | Date of Publication | Type |
|---|
| Impossible differential cryptanalysis of the raindrop block cipher | 2025-01-10 | Paper |
| Improved meet-in-the-middle attacks on nine rounds of the AES-192 block cipher | 2024-11-12 | Paper |
| Collision-based attacks on white-box implementations of the AES block cipher | 2024-10-16 | Paper |
| Rectangle attacks on reduced versions of the FBC block cipher | 2024-08-30 | Paper |
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher Designs, Codes and Cryptography | 2024-04-22 | Paper |
| Cryptanalysis of two white-box implementations of the SM4 block cipher | 2022-07-13 | Paper |
On the security of the LAC authenticated encryption algorithm Information Security and Privacy | 2016-09-02 | Paper |
Time-memory trade-off attack on the GSM A5/1 stream cipher using commodity GPGPU (extended abstract) Applied Cryptography and Network Security | 2016-03-10 | Paper |
On lightweight security enforcement in cyber-physical systems Lecture Notes in Computer Science | 2016-02-22 | Paper |
A methodology for differential-linear cryptanalysis and its applications Designs, Codes and Cryptography | 2015-09-30 | Paper |
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher Lecture Notes in Computer Science | 2014-08-20 | Paper |
Differential attack on nine rounds of the SEED block cipher Information Processing Letters | 2014-04-14 | Paper |
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher Theoretical Computer Science | 2014-03-13 | Paper |
Differential attack on five rounds of the SC2000 block cipher Journal of Computer Science and Technology | 2014-02-06 | Paper |
Meet-in-the-middle attack on reduced versions of the Camellia block cipher Advances in Information and Computer Security | 2013-04-04 | Paper |
Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
A methodology for differential-linear cryptanalysis and its applications (extended abstract) Fast Software Encryption | 2013-01-08 | Paper |
The (related-key) impossible boomerang attack and its application to the AES block cipher Designs, Codes and Cryptography | 2011-06-17 | Paper |
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits Information Security Practice and Experience | 2011-05-19 | Paper |
Differential attack on five rounds of the SC2000 block cipher Information Security and Cryptology | 2010-11-23 | Paper |
Principles on the security of AES against first and second-order differential power analysis Applied Cryptography and Network Security | 2010-07-06 | Paper |
Security Weaknesses in Two Proxy Signature Schemes Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
New Impossible Differential Attacks on AES Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b Lecture Notes in Computer Science | 2008-11-27 | Paper |
Related-Key Rectangle Attack on 42-Round SHACAL-2 Lecture Notes in Computer Science | 2008-06-17 | Paper |
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 Lecture Notes in Computer Science | 2008-05-06 | Paper |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 Topics in Cryptology – CT-RSA 2008 | 2008-04-24 | Paper |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1 Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |