| Publication | Date of Publication | Type |
|---|
| Multi-user security of the Elephant v2 authenticated encryption mode | 2024-10-14 | Paper |
| Generic security of the SAFE API and its applications | 2024-06-26 | Paper |
The COLM Authenticated Encryption Scheme Journal of Cryptology | 2024-04-21 | Paper |
Revisiting the indifferentiability of the sum of permutations Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Security of truncated permutation without initial value Advances in Cryptology – ASIACRYPT 2022 | 2023-08-16 | Paper |
Tight preimage resistance of the sponge construction Advances in Cryptology – CRYPTO 2022 | 2023-07-07 | Paper |
The Relation Between CENC and NEMO Cryptology and Network Security | 2023-06-28 | Paper |
Categorization of faulty nonce misuse resistant message authentication Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Beyond birthday bound secure fresh rekeying: application to authenticated encryption | 2023-03-21 | Paper |
| The summation-truncation hybrid: reusing discarded bits for free | 2022-11-09 | Paper |
Collapseability of tree hashes Post-Quantum Cryptography | 2022-10-13 | Paper |
| Leakage resilient value comparison with application to message authentication | 2021-12-08 | Paper |
On the resilience of Even-Mansour to invariant permutations Designs, Codes and Cryptography | 2021-05-10 | Paper |
Practical forgeries for ORANGE Information Processing Letters | 2020-08-04 | Paper |
| How to build pseudorandom functions from public random permutations | 2020-05-20 | Paper |
| Leakage resilience of the duplex construction | 2020-05-11 | Paper |
| Linking Stam's bounds with generalized truncation | 2020-01-28 | Paper |
Beyond conventional security in sponge-based authenticated encryption modes Journal of Cryptology | 2019-08-13 | Paper |
| Short variable length domain extenders with beyond birthday bound security | 2018-12-20 | Paper |
| Towards tight security of cascaded LRW2 | 2018-12-06 | Paper |
| Recipient privacy in online social networks (short paper) | 2018-10-24 | Paper |
| Damaging, simplifying, and salvaging p-OMD | 2018-10-18 | Paper |
| XOR of PRPs in a quantum world | 2018-09-12 | Paper |
Connecting tweakable and multi-key blockcipher security Designs, Codes and Cryptography | 2018-04-06 | Paper |
| Full-state keyed duplex with built-in multi-user support | 2018-03-08 | Paper |
| Analyzing multi-key security degradation | 2018-03-08 | Paper |
| scientific article; zbMATH DE number 6823400 (Why is no real title available?) | 2018-01-09 | Paper |
| Insuperability of the standard versus ideal model gap for tweakable blockcipher security | 2017-11-15 | Paper |
| Encrypted Davies-Meyer and its dual: towards optimal security using mirror theory | 2017-10-27 | Paper |
Optimal collision security in double block length hashing with single length key Designs, Codes and Cryptography | 2017-04-13 | Paper |
Weak keys for AEZ, and the external key padding attack Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
XPX: generalized tweakable Even-Mansour with improved security guarantees Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Forgery and subkey recovery on CAESAR candidate iFeed Lecture Notes in Computer Science | 2016-05-19 | Paper |
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
On the impact of known-key attacks on hash functions Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
Security of full-state keyed sponge and duplex: applications to authenticated encryption Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
On the XOR of multiple random permutations Applied Cryptography and Network Security | 2016-03-10 | Paper |
Provable Security of BLAKE with Non-ideal Compression Function Selected Areas in Cryptography | 2015-12-04 | Paper |
Open problems in hash function security Designs, Codes and Cryptography | 2015-10-26 | Paper |
Two-permutation-based hashing with binary mixing Journal of Mathematical Cryptology | 2015-10-13 | Paper |
COBRA: a parallelizable authenticated online cipher without block cipher inverse Fast Software Encryption | 2015-09-18 | Paper |
Optimally secure tweakable blockciphers Fast Software Encryption | 2015-09-18 | Paper |
Towards Understanding the Known-Key Security of Block Ciphers Fast Software Encryption | 2015-09-18 | Paper |
Security of Keyed Sponge Constructions Using a Modular Proof Approach Fast Software Encryption | 2015-09-18 | Paper |
APE: authenticated permutation-based encryption for lightweight cryptography Fast Software Encryption | 2015-09-18 | Paper |
Breaking and Fixing Cryptophia’s Short Combiner Cryptology and Network Security | 2015-02-10 | Paper |
How to securely release unverified plaintext in authenticated encryption Lecture Notes in Computer Science | 2015-01-16 | Paper |
Beyond \(2^{c/2}\) security in sponge-based authenticated encryption modes Lecture Notes in Computer Science | 2015-01-16 | Paper |
The security of multiple encryption in the ideal cipher model Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
On the collision and preimage security of MDC-4 in the ideal cipher model Designs, Codes and Cryptography | 2014-08-01 | Paper |
Indifferentiability of double length compression functions Cryptography and Coding | 2014-01-17 | Paper |
Parallelizable and authenticated online ciphers Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
On the indifferentiability of key-alternating ciphers Advances in Cryptology – CRYPTO 2013 | 2013-09-02 | Paper |
Optimal collision security in double block length hashing with single length key Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Hash functions based on three permutations: a generic security analysis Lecture Notes in Computer Science | 2012-09-25 | Paper |
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Provable chosen-target-forced-midfix preimage resistance Selected Areas in Cryptography | 2012-06-08 | Paper |
Increasing the flexibility of the herding attack Information Processing Letters | 2012-03-09 | Paper |
Security reductions of the second round SHA-3 candidates Lecture Notes in Computer Science | 2011-02-11 | Paper |
Anonymous credential schemes with encrypted attributes Cryptology and Network Security | 2010-12-07 | Paper |
On the indifferentiability of the Grøstl hash function Lecture Notes in Computer Science | 2010-09-10 | Paper |