| Publication | Date of Publication | Type |
|---|
| Understanding unexpected fixed-key differential behaviours: how to avoid major weaknesses in lightweight designs | 2026-03-31 | Paper |
On the algebraic degree of iterated power functions Designs, Codes and Cryptography | 2023-03-17 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
Recovering or Testing Extended-Affine Equivalence IEEE Transactions on Information Theory | 2022-10-11 | Paper |
| Autocorrelations of vectorial Boolean functions | 2022-06-15 | Paper |
If a generalised butterfly is APN then it operates on 6 bits Cryptography and Communications | 2020-05-12 | Paper |
| BISON instantiating the whitened swap-or-not construction | 2020-02-04 | Paper |
DFA on LS-designs with a practical implementation on SCREAM Constructive Side-Channel Analysis and Secure Design | 2019-09-16 | Paper |
On CCZ-equivalence, extended-affine equivalence, and function twisting Finite Fields and their Applications | 2019-03-27 | Paper |
Two notions of differential equivalence on Sboxes Designs, Codes and Cryptography | 2019-02-20 | Paper |
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression Journal of Cryptology | 2018-09-14 | Paper |
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size $2^{4k+2}$ IEEE Transactions on Information Theory | 2018-06-27 | Paper |
Attacks against filter generators exploiting monomial mappings Fast Software Encryption | 2018-05-09 | Paper |
Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression Fast Software Encryption | 2018-05-09 | Paper |
A new algorithm for finding minimum-weight words in large linear codes Cryptography and Coding | 2018-03-21 | Paper |
| Proving resistance against invariant attacks: how to choose the round constants | 2017-11-15 | Paper |
Differential Properties of ${x\mapsto x^{2^{t}-1}}$ IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Parity-Check Relations on Combination Generators IEEE Transactions on Information Theory | 2017-07-12 | Paper |
On the Influence of the Algebraic Degree of $F^{-1}$ on the Algebraic Degree of $G \circ F$ IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Reflection ciphers Designs, Codes and Cryptography | 2017-02-10 | Paper |
Another view of the division property Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Extended differential properties of cryptographic functions Topics in Finite Fields | 2016-09-02 | Paper |
Related-key attack on full-round PICARO Lecture Notes in Computer Science | 2016-05-19 | Paper |
Construction of lightweight S-boxes using Feistel and MISTY structures Lecture Notes in Computer Science | 2016-05-19 | Paper |
Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks Advances in Cryptology -- EUROCRYPT 2015 | 2015-09-30 | Paper |
Differential attacks against SPN: a thorough analysis Lecture Notes in Computer Science | 2015-09-21 | Paper |
Multiple differential cryptanalysis of round-reduced \textsc{PRINCE} Fast Software Encryption | 2015-09-18 | Paper |
A new criterion for avoiding the propagation of linear relations through an sbox Fast Software Encryption | 2015-09-18 | Paper |
Construction of \(t\)-resilient functions over a finite alphabet Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Sieve-in-the-middle: improved MITM attacks Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Correlation attacks on combination generators Cryptography and Communications | 2013-06-24 | Paper |
PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Higher-order differential properties of Keccak and Luffa Fast Software Encryption | 2011-07-07 | Paper |
Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256 Selected Areas in Cryptography | 2011-03-15 | Paper |
Differential properties of power functions International Journal of Information and Coding Theory | 2011-02-04 | Paper |
| Structural weaknesses of permutations with a low differential uniformity and generalized crooked functions | 2011-01-03 | Paper |
Symmetric Boolean Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On Almost Perfect Nonlinear Functions Over$mmb F_2^n$ IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Decomposing bent functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A new class of monomial bent functions Finite Fields and their Applications | 2008-02-06 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Construction of bent functions via Niho power functions Journal of Combinatorial Theory. Series A | 2006-08-04 | Paper |
Finding nonnormal bent functions Discrete Applied Mathematics | 2006-04-28 | Paper |
| Propagation characteristics and correlation-immunity of highly nonlinear Boolean functions | 2006-03-01 | Paper |
| scientific article; zbMATH DE number 2154504 (Why is no real title available?) | 2005-04-09 | Paper |
| scientific article; zbMATH DE number 2086728 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 1857509 (Why is no real title available?) | 2003-05-19 | Paper |
| scientific article; zbMATH DE number 1759269 (Why is no real title available?) | 2002-11-24 | Paper |
| scientific article; zbMATH DE number 1418253 (Why is no real title available?) | 2002-10-09 | Paper |
On cryptographic properties of the cosets of R(1, m) IEEE Transactions on Information Theory | 2002-08-04 | Paper |
On the weight distributions of optimal cosets of the first-order Reed-Muller codes IEEE Transactions on Information Theory | 2002-08-04 | Paper |
Binary m-sequences with three-valued crosscorrelation: a proof of Welch's conjecture IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Correlation-immune and resilient functions over a finite alphabet and their applications in cryptography Designs, Codes and Cryptography | 2000-05-22 | Paper |
Weight Divisibility of Cyclic Codes, Highly Nonlinear Functions on F2m, and Crosscorrelation of Maximum-Length Sequences SIAM Journal on Discrete Mathematics | 2000-03-19 | Paper |
| scientific article; zbMATH DE number 1302794 (Why is no real title available?) | 2000-02-15 | Paper |
Couples de suites binaires de longueur maximale ayant une corrélation croisée à trois valeurs: conjecture de Welch Comptes Rendus de l'Académie des Sciences - Series I - Mathematics | 1999-06-29 | Paper |
A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511 IEEE Transactions on Information Theory | 1998-08-10 | Paper |