| Publication | Date of Publication | Type |
|---|
| Towards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitations | 2024-10-31 | Paper |
| \texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applications | 2024-02-02 | Paper |
| Truncated differential properties of the diagonal set of inputs for 5-round AES | 2023-07-26 | Paper |
| An algebraic attack on ciphers with low-degree round functions: application to full MiMC | 2023-03-21 | Paper |
| Feistel structures for MPC, and more | 2022-08-25 | Paper |
| A Signature-Based Gr\"obner Basis Algorithm with Tail-Reduced Reductors (M5GB) | 2022-08-01 | Paper |
| Weak-key distinguishers for AES | 2022-03-25 | Paper |
| On a generalization of substitution-permutation networks: the HADES design strategy | 2022-03-23 | Paper |
| Revisiting Gilbert's known-key distinguisher | 2020-07-15 | Paper |
| Algebraic cryptanalysis of STARK-friendly designs: application to MARVELlous and MiMC | 2020-05-11 | Paper |
| Linear equivalence of block ciphers with partial non-linear layers: application to LowMC | 2020-02-04 | Paper |
| Zero-sum partitions of PHOTON permutations | 2020-01-21 | Paper |
| Rasta: a cipher with low ANDdepth and few ANDs per bit | 2018-09-12 | Paper |
| A New Structural-Differential Property of 5-Round AES | 2017-06-13 | Paper |
| MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity | 2017-02-01 | Paper |
| Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE | 2016-12-21 | Paper |
| Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows | 2016-03-02 | Paper |
| Improved Cryptanalysis of the Block Cipher KASUMI | 2015-12-04 | Paper |
| The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE | 2015-10-01 | Paper |
| Ciphers for MPC and FHE | 2015-09-30 | Paper |
| Linear Distinguishers in the Key-less Setting: Application to PRESENT | 2015-09-18 | Paper |
| Practical Attacks on AES-like Cryptographic Hash Functions | 2015-09-17 | Paper |
| State-Recovery Analysis of Spritz | 2015-09-17 | Paper |
| The rebound attack and subspace distinguishers: application to Whirlpool | 2015-05-12 | Paper |
| Rotational rebound attacks on reduced Skein | 2014-09-25 | Paper |
| On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis | 2013-06-04 | Paper |
| PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications | 2013-03-19 | Paper |
| Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family | 2013-01-08 | Paper |
| Narrow-Bicliques: Cryptanalysis of Full IDEA | 2012-06-29 | Paper |
| Biclique Cryptanalysis of the Full AES | 2011-12-02 | Paper |
| Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) | 2011-07-07 | Paper |
| A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN | 2011-03-15 | Paper |
| Rotational Rebound Attacks on Reduced Skein | 2010-12-07 | Paper |
| Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | 2010-12-07 | Paper |
| Second-Preimage Analysis of Reduced SHA-1 | 2010-10-25 | Paper |
| Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 | 2010-05-04 | Paper |
| Rebound Attacks on the Reduced Grøstl Hash Function | 2010-03-16 | Paper |
| Rebound Distinguishers: Results on the Full Whirlpool Compression Function | 2009-12-15 | Paper |
| MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners | 2009-12-15 | Paper |
| Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher | 2009-12-09 | Paper |
| Collisions and Other Non-random Properties for Step-Reduced SHA-256 | 2009-11-03 | Paper |
| The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl | 2009-08-11 | Paper |
| Cryptanalysis of Vortex | 2009-07-07 | Paper |
| Cryptanalysis of MDC-2 | 2009-05-12 | Paper |
| Analysis of Step-Reduced SHA-256 | 2009-04-02 | Paper |
| The Impact of Carries on the Complexity of Collision Attacks on SHA-1 | 2009-04-02 | Paper |
| Analysis of the Hash Function Design Strategy Called SMASH | 2009-02-24 | Paper |
| Preimages for Reduced SHA-0 and SHA-1 | 2009-02-10 | Paper |
| Cryptanalysis of the GOST Hash Function | 2009-02-10 | Paper |
| Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 | 2009-01-22 | Paper |
| Threshold Implementations Against Side-Channel Attacks and Glitches | 2008-11-11 | Paper |
| New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba | 2008-09-18 | Paper |
| A (Second) Preimage Attack on the GOST Hash Function | 2008-09-18 | Paper |
| The Grindahl Hash Functions | 2008-09-16 | Paper |
| On the Collision Resistance of RIPEMD-160 | 2008-06-17 | Paper |
| Correlated Keystreams in Moustique | 2008-06-13 | Paper |
| Improved Collision Attack on the Hash Function Proposed at PKC’98 | 2008-05-06 | Paper |
| Finding SHA-1 Characteristics: General Results and Applications | 2008-04-24 | Paper |
| Second Preimages for SMASH | 2008-04-17 | Paper |
| Collisions for 70-Step SHA-1: On the Full Cost of Collision Search | 2008-03-25 | Paper |
| On Authentication with HMAC and Non-random Properties | 2008-03-07 | Paper |
| Impact of Rotations in SHA-1 and Related Hash Functions | 2007-11-15 | Paper |
| Breaking a New Hash Function Design Strategy Called SMASH | 2007-11-15 | Paper |
| Cryptography and Coding | 2006-11-01 | Paper |