| Publication | Date of Publication | Type |
|---|
Differential-linear cryptanalysis from an algebraic perspective Journal of Cryptology | 2025-12-16 | Paper |
| Probabilistic linearization: internal differential collisions in up to 6 rounds of SHA-3 | 2024-12-13 | Paper |
| A three-stage MITM attack on LowMC from a single plaintext-ciphertext pair | 2024-10-16 | Paper |
Closed Range and Preserving Frames of Weighted Composition Operator on Quaternionic Fock Space Results in Mathematics | 2024-05-02 | Paper |
| Cube Cryptanalysis of Round-Reduced ACORN | 2024-03-14 | Paper |
Moving a step of ChaCha in syncopated rhythm Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Collision attacks on round-reduced SHA-3 using conditional internal differentials Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Cryptanalysis of Ciminion Information Security and Cryptology | 2023-08-21 | Paper |
Conditional Cube Searching and Applications on Trivium-Variant Ciphers Developments in Language Theory | 2023-06-30 | Paper |
Self-adjoint, unitary, and isometric weighted composition operators on quaternionic Fock space Banach Journal of Mathematical Analysis | 2023-02-07 | Paper |
Identification and construction of Boolean functions with maximum algebraic immunity Science China Information Sciences | 2022-10-28 | Paper |
| Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT | 2022-07-01 | Paper |
| Differential-linear cryptanalysis from an algebraic perspective | 2022-04-22 | Paper |
Results on highly nonlinear Boolean functions with provably good immunity to fast algebraic attacks Information Sciences | 2020-07-16 | Paper |
Practical collision attacks against round-reduced SHA-3 Journal of Cryptology | 2020-03-03 | Paper |
| Symbolic-like computation and conditional differential cryptanalysis of QUARK | 2018-10-24 | Paper |
| Correlation cube attacks: from weak-key distinguisher to key recovery | 2018-07-09 | Paper |
Lightweight MDS generalized circulant matrices Fast Software Encryption | 2018-05-09 | Paper |
| Degree evaluation of NFSR-based cryptosystems | 2017-10-27 | Paper |
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions IEEE Transactions on Information Theory | 2017-07-12 | Paper |
New collision attacks on round-reduced Keccak Lecture Notes in Computer Science | 2017-06-23 | Paper |
Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak} Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
New insights on AES-like SPN ciphers Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
A new classification of 4-bit optimal S-boxes and its application to PRESENT, RECTANGLE and SPONGENT Fast Software Encryption | 2015-09-18 | Paper |
On the immunity of rotation symmetric Boolean functions against fast algebraic attacks Discrete Applied Mathematics | 2014-09-12 | Paper |
Comments on ``A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation Cryptography and Communications | 2013-08-02 | Paper |
Construction of resilient and nonlinear Boolean functions with almost perfect immunity to algebraic and fast algebraic attacks Information Security and Cryptology | 2013-05-28 | Paper |
Perfect algebraic immune functions Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
On the resistance of Boolean functions against fast algebraic attacks Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
On the nonexistence of bent functions International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
Results on the immunity of Boolean functions against probabilistic algebraic attacks Information Security and Privacy | 2011-07-07 | Paper |
On designated-weight Boolean functions with highest algebraic immunity Science China. Mathematics | 2011-02-25 | Paper |