| Publication | Date of Publication | Type |
|---|
| Mystrium: wide block encryption efficient on entry-level processors | 2025-01-10 | Paper |
Propagation properties of a non-linear mapping based on squaring in odd characteristic Cryptography and Communications | 2024-11-26 | Paper |
| Multimixer-156: universal keyed hashing based on integer multiplication and cyclic shift | 2024-10-23 | Paper |
| ACE-HoT: \underline{A}ccelerating an extreme amount of symmetric \underline{C}ipher \underline{E}valuations for (\underline{H}igh-\underline{o}rder) avalanche \underline{T}ests | 2024-10-16 | Paper |
Algebraic properties of the maps \(\chi_n\) Designs, Codes and Cryptography | 2024-08-13 | Paper |
The state diagram of $$\chi $$ Designs, Codes and Cryptography | 2024-05-08 | Paper |
Universal hashing based on field multiplication and (near-)MDS matrices Progress in Cryptology - AFRICACRYPT 2023 | 2024-02-02 | Paper |
Twin column parity mixers and Gaston. A new mixing layer and permutation Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
On the security of keyed hashing based on public permutations Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Differential and linear properties of vectorial Boolean functions based on chi Cryptography and Communications | 2023-12-14 | Paper |
Jammin' on the deck Advances in Cryptology – ASIACRYPT 2022 | 2023-08-16 | Paper |
Weak subtweakeys in SKINNY Lecture Notes in Computer Science | 2023-08-14 | Paper |
Online template attack on ECDSA: extracting keys via the other side Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
| Computing the distribution of differentials over the non-linear mapping \(\chi \) | 2022-07-13 | Paper |
| Thinking outside the superbox | 2022-04-22 | Paper |
| \textsc{Friet}: an authenticated encryption scheme with built-in fault detection | 2021-12-01 | Paper |
The design of Rijndael. The Advanced Encryption Standard (AES) Information Security and Cryptography | 2020-07-20 | Paper |
Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing Lecture Notes in Computer Science | 2020-06-24 | Paper |
| Breaking Ed25519 in WolfSSL | 2020-01-21 | Paper |
| Spectral characterization of iterating lossy mappings | 2018-10-26 | Paper |
| \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\) | 2018-08-10 | Paper |
The block cipher \textsc{Square} Fast Software Encryption | 2018-05-09 | Paper |
Fast hashing and stream encryption with \textsc{Panama} Fast Software Encryption | 2018-05-09 | Paper |
| Full-state keyed duplex with built-in multi-user support | 2018-03-08 | Paper |
| scientific article; zbMATH DE number 6823395 (Why is no real title available?) | 2018-01-09 | Paper |
The cipher SHARK Fast Software Encryption | 2017-11-15 | Paper |
Security of Keyed Sponge Constructions Using a Modular Proof Approach Fast Software Encryption | 2015-09-18 | Paper |
| Correlation analysis in \(\mathrm{GF}(2^n)\) | 2014-08-07 | Paper |
Sakura: a flexible coding for tree hashing Applied Cryptography and Network Security | 2014-07-07 | Paper |
Keccak Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Differential Propagation Analysis of Keccak Fast Software Encryption | 2013-01-08 | Paper |
Duplexing the sponge: Single-pass authenticated encryption and other applications Selected Areas in Cryptography | 2012-06-08 | Paper |
Sponge-based pseudo-random number generators Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
New criteria for linear maps in AES-like ciphers Cryptography and Communications | 2009-10-26 | Paper |
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers Computing | 2009-08-10 | Paper |
Understanding Two-Round Differentials in AES Lecture Notes in Computer Science | 2008-11-27 | Paper |
Distinguishing Stream Ciphers with Convolutional Filters Lecture Notes in Computer Science | 2008-11-27 | Paper |
Producing Collisions for Panama, Instantaneously Fast Software Encryption | 2008-09-16 | Paper |
On the Indifferentiability of the Sponge Construction Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Probability distributions of correlation and differentials in block ciphers Journal of Mathematical Cryptology | 2008-02-21 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
| scientific article; zbMATH DE number 2086701 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 1955777 (Why is no real title available?) | 2003-07-29 | Paper |
The Wide Trail Design Strategy Cryptography and Coding | 2002-11-25 | Paper |
| scientific article; zbMATH DE number 1759267 (Why is no real title available?) | 2002-10-01 | Paper |
| scientific article; zbMATH DE number 1682693 (Why is no real title available?) | 2001-12-17 | Paper |
Linear frameworks for block ciphers Designs, Codes and Cryptography | 2001-02-18 | Paper |
| scientific article; zbMATH DE number 1504787 (Why is no real title available?) | 2000-09-12 | Paper |
A new approach to block cipher design Fast Software Encryption | 2000-08-30 | Paper |
| scientific article; zbMATH DE number 1455107 (Why is no real title available?) | 2000-06-05 | Paper |
| scientific article; zbMATH DE number 1394322 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1024059 (Why is no real title available?) | 1997-12-15 | Paper |
Limitations of the Even-Mansour construction Advances in Cryptology — ASIACRYPT '91 | 1995-11-28 | Paper |
| scientific article; zbMATH DE number 697803 (Why is no real title available?) | 1995-01-08 | Paper |
| scientific article; zbMATH DE number 697836 (Why is no real title available?) | 1995-01-08 | Paper |
Invertible shift-invariant transformations on binary arrays Applied Mathematics and Computation | 1994-09-12 | Paper |