| Publication | Date of Publication | Type |
|---|
Cryptanalysis of algebraic verifiable delay functions | 2024-12-13 | Paper |
PURED: a unified framework for resource-hard functions | 2024-10-23 | Paper |
Advancing the meet-in-the-filter technique: applications to CHAM and KATAN | 2024-10-16 | Paper |
Automated truncation of differential trails and trail clustering in ARX | 2024-10-14 | Paper |
Meet-in-the-filter and dynamic counting with applications to \textsc{Speck} | 2023-11-09 | Paper |
Analysis and probing of parallel channels in the lightning network Financial Cryptography and Data Security | 2023-05-26 | Paper |
Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) | 2022-12-07 | Paper |
Dynamic universal accumulator with batch update over bilinear groups | 2022-07-06 | Paper |
Side-channel attacks meet secure network protocols | 2022-07-01 | Paper |
Cryptanalysis of a dynamic universal accumulator over bilinear groups | 2021-12-20 | Paper |
Dummy shuffling against algebraic attacks in white-box implementations | 2021-12-08 | Paper |
On degree-\(d\) zero-sum sets of full rank Cryptography and Communications | 2020-09-30 | Paper |
Attacks and countermeasures for white-box designs | 2019-01-23 | Paper |
Automatic search for the best trails in ARX: application to block cipher \textsc{Speck} Fast Software Encryption | 2018-05-09 | Paper |
Symmetrically and asymmetrically hard cryptography | 2018-02-23 | Paper |
Design Strategies for ARX with Provable Bounds: Sparx and LAX Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem Advances in Cryptology – CRYPTO 2016 | 2016-10-27 | Paper |
Correlation power analysis of lightweight block ciphers: from theory to practice Applied Cryptography and Network Security | 2016-10-04 | Paper |
Reverse-engineering the S-Bbox of Streebog, Kuznyechik and Stribobr1 Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Cryptanalysis of Feistel networks with secret round functions Lecture Notes in Computer Science | 2016-05-19 | Paper |
Colliding keys for SC2000-256 Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Tradeoff Cryptanalysis of Memory-Hard Functions Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure Lecture Notes in Computer Science | 2015-12-10 | Paper |
Cryptanalysis of the loiss stream cipher Selected Areas in Cryptography | 2015-12-04 | Paper |
Cryptanalysis of the ``Kindle cipher Selected Areas in Cryptography | 2015-12-04 | Paper |
PAEQ: parallelizable permutation-based authenticated encryption Lecture Notes in Computer Science | 2015-11-03 | Paper |
Complementing Feistel ciphers Fast Software Encryption | 2015-09-18 | Paper |
Differential analysis of block ciphers \textsc{Simon} and \textsc{Speck} Fast Software Encryption | 2015-09-18 | Paper |
Differential analysis and meet-in-the-middle attack against round-reduced TWINE Fast Software Encryption | 2015-09-18 | Paper |
Differential entropy analysis of the IDEA block cipher Journal of Computational and Applied Mathematics | 2015-06-17 | Paper |
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) Lecture Notes in Computer Science | 2015-01-16 | Paper |
Automatic Search for Differential Trails in ARX Ciphers Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Cryptanalysis of the full AES using GPU-like special-purpose hardware Fundamenta Informaticae | 2012-05-11 | Paper |
Second-order differential collisions for reduced SHA-256 Lecture Notes in Computer Science | 2011-12-02 | Paper |
Search for Related-Key Differential Characteristics in DES-Like Ciphers Fast Software Encryption | 2011-07-07 | Paper |
Boomerang attacks on BLAKE-32 Fast Software Encryption | 2011-07-07 | Paper |
Structural cryptanalysis of SASAS Journal of Cryptology | 2010-11-12 | Paper |
Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G\(^{ \oplus }\) Applied Cryptography and Network Security | 2010-07-06 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Automatic search for related-key differential characteristics in byte-oriented block ciphers: application to AES, Camellia, Khazad and others Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Cryptanalysis of 3-pass HAVAL Lecture Notes in Computer Science | 2010-01-05 | Paper |
Block ciphers and systems of quadratic equations. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Analysis of involutional ciphers: Khazad and Anubis. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Related-Key Cryptanalysis of the Full AES-192 and AES-256 Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Distinguisher and Related-Key Attack on the Full AES-256 Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Cryptanalysis of the LAKE Hash Family Fast Software Encryption | 2009-08-11 | Paper |
Speeding up Collision Search for Byte-Oriented Hash Functions Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Slid Pairs in Salsa20 and Trivium Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) Lecture Notes in Computer Science | 2008-11-27 | Paper |
Collisions for Step-Reduced SHA-256 Fast Software Encryption | 2008-09-18 | Paper |
Two Trivial Attacks on Trivium Selected Areas in Cryptography | 2008-03-25 | Paper |
The Design of a Stream Cipher LEX Selected Areas in Cryptography | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
Analysis of a SHA-256 Variant Selected Areas in Cryptography | 2007-11-15 | Paper |
Improved Time-Memory Trade-Offs with Multiple Data Selected Areas in Cryptography | 2007-11-15 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials Journal of Cryptology | 2006-08-14 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Adavanced slide attacks | 2006-03-01 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Advanced Encryption Standard – AES Lecture Notes in Computer Science | 2005-09-14 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
scientific article; zbMATH DE number 2009947 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 1980970 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1759258 (Why is no real title available?) | 2002-10-13 | Paper |
scientific article; zbMATH DE number 1722688 (Why is no real title available?) | 2002-03-21 | Paper |
scientific article; zbMATH DE number 1583765 (Why is no real title available?) | 2001-07-03 | Paper |
scientific article; zbMATH DE number 1418257 (Why is no real title available?) | 2000-08-27 | Paper |
scientific article; zbMATH DE number 1418249 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1302839 (Why is no real title available?) | 2000-03-07 | Paper |
scientific article; zbMATH DE number 1304130 (Why is no real title available?) | 2000-02-01 | Paper |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials Advances in Cryptology — EUROCRYPT ’99 | 1999-10-05 | Paper |
scientific article; zbMATH DE number 1303115 (Why is no real title available?) | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1088943 (Why is no real title available?) | 1997-11-18 | Paper |
scientific article; zbMATH DE number 1024498 (Why is no real title available?) | 1997-11-02 | Paper |
An improvement of Davies' attack on DES Journal of Cryptology | 1997-08-28 | Paper |