| Publication | Date of Publication | Type |
|---|
| Cryptanalysis of algebraic verifiable delay functions | 2024-12-13 | Paper |
| Generic security of the SAFE API and its applications | 2024-06-26 | Paper |
\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function Progress in Cryptology - AFRICACRYPT 2023 | 2024-02-02 | Paper |
| T5: Hashing five inputs with three compression calls | 2023-07-03 | Paper |
| Aggregatable subvector commitments for stateless cryptocurrencies | 2022-12-16 | Paper |
| Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC | 2020-05-11 | Paper |
Tradeoff Cryptanalysis of Memory-Hard Functions Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
PAEQ: parallelizable permutation-based authenticated encryption Lecture Notes in Computer Science | 2015-11-03 | Paper |
The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Rotational cryptanalysis of ARX revisited Fast Software Encryption | 2015-09-18 | Paper |
Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-64 Fast Software Encryption | 2015-09-18 | Paper |
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract) Lecture Notes in Computer Science | 2015-01-16 | Paper |
Rotational rebound attacks on reduced Skein Journal of Cryptology | 2014-09-25 | Paper |
Key wrapping with a fixed permutation Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Bicliques for permutations: collision and preimage attacks in stronger settings Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Bicliques for preimages: attacks on Skein-512 and the SHA-2 family Fast Software Encryption | 2013-01-08 | Paper |
New preimage attacks against reduced SHA-1 Lecture Notes in Computer Science | 2012-09-25 | Paper |
Narrow-bicliques: cryptanalysis of full IDEA Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Biclique Cryptanalysis of the Full AES Lecture Notes in Computer Science | 2011-12-02 | Paper |
Cryptanalysis of Luffa v2 components Selected Areas in Cryptography | 2011-03-15 | Paper |
Rotational Rebound Attacks on Reduced Skein Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Rotational cryptanalysis of ARX Fast Software Encryption | 2010-07-13 | Paper |
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Related-Key Cryptanalysis of the Full AES-192 and AES-256 Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Cryptanalysis of hash functions with structures Selected Areas in Cryptography | 2009-12-09 | Paper |
Distinguisher and Related-Key Attack on the Full AES-256 Advances in Cryptology - CRYPTO 2009 | 2009-10-20 | Paper |
Meet-in-the-Middle Attacks on SHA-3 Candidates Fast Software Encryption | 2009-08-11 | Paper |
Cryptanalysis of the LAKE Hash Family Fast Software Encryption | 2009-08-11 | Paper |
Speeding up Collision Search for Byte-Oriented Hash Functions Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
New State Recovery Attack on RC4 Lecture Notes in Computer Science | 2009-02-10 | Paper |
Two Attacks on RadioGatún Progress in Cryptology - INDOCRYPT 2008 | 2009-01-22 | Paper |