| Publication | Date of Publication | Type |
|---|
| Parallel SAT framework to find clustering of differential characteristics and its applications | 2024-10-16 | Paper |
| Revisiting the boomerang attack from a perspective of 3-differential | 2024-07-23 | Paper |
| Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher | 2024-03-26 | Paper |
| More Results on Shortest Linear Programs | 2024-03-14 | Paper |
| Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure | 2024-03-14 | Paper |
| Coefficient grouping for complex affine layers | 2024-02-02 | Paper |
| Ghidle: efficient large-state block ciphers for post-quantum security | 2024-01-11 | Paper |
| Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP | 2023-12-08 | Paper |
| Coefficient grouping: breaking Chaghri and more | 2023-12-08 | Paper |
| An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros | 2023-10-04 | Paper |
| Algebraic meet-in-the-middle attack on LowMC | 2023-08-25 | Paper |
| A modular approach to the incompressibility of block-cipher-based AEADs | 2023-08-16 | Paper |
| Several MILP-Aided Attacks Against SNOW 2.0 | 2023-06-28 | Paper |
| Quantum security analysis of Rocca | 2023-05-23 | Paper |
| Algebraic attacks on Rasta and Dasta using low-degree equations | 2023-05-12 | Paper |
| Three input exclusive-or gate support for Boyar-Peralta's algorithm | 2023-05-12 | Paper |
| Algebraic Attacks on Round-Reduced Keccak | 2023-04-13 | Paper |
| Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V | 2023-04-13 | Paper |
| Automatic verification of differential characteristics: application to reduced Gimli | 2022-12-07 | Paper |
| Differential fault attack on Rocca | 2022-12-07 | Paper |
| The inverse of \(\chi\) and its applications to Rasta-like ciphers | 2022-10-06 | Paper |
| Cryptanalysis of full LowMC and LowMC-M with algebraic techniques | 2022-04-22 | Paper |
| WARP: revisiting GFN for lightweight 128-bit block cipher | 2022-03-25 | Paper |
| ACE in chains: how risky is CBC encryption of binary executable files? | 2021-02-23 | Paper |
| Iterative differential characteristic of TRIFLE-BC | 2020-07-21 | Paper |
| Plaintext recovery attacks against XTS beyond collisions | 2020-07-21 | Paper |
| Efficient collision attack frameworks for RIPEMD-160 | 2020-03-09 | Paper |
| Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly | 2020-01-28 | Paper |
| Cube Attacks on Non-Blackbox Polynomials Based on Division Property | 2019-03-07 | Paper |
| Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 | 2018-09-26 | Paper |
| Improved division property based cube attacks exploiting algebraic properties of superpoly | 2018-09-12 | Paper |
| Cryptanalysis of the Full Spritz Stream Cipher | 2018-05-09 | Paper |
| New key recovery attacks on minimal two-round Even-Mansour ciphers | 2018-04-06 | Paper |
| Cube attacks on non-blackbox polynomials based on division property | 2017-10-27 | Paper |
| Conditional differential cryptanalysis for Kreyvium | 2017-08-25 | Paper |
| Improved integral attack on HIGHT | 2017-08-25 | Paper |
| Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness | 2017-02-01 | Paper |
| Some Proofs of Joint Distributions of Keystream Biases in RC4 | 2016-12-21 | Paper |
| Midori: A Block Cipher for Low Energy | 2016-03-23 | Paper |
| How Secure is AES Under Leakage | 2016-03-23 | Paper |
| All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach | 2015-12-04 | Paper |
| How to Recover Any Byte of Plaintext on RC4 | 2015-10-01 | Paper |
| Full Plaintext Recovery Attack on Broadcast RC4 | 2015-09-18 | Paper |
| Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers | 2015-09-18 | Paper |
| Generic Key Recovery Attack on Feistel Scheme | 2013-12-10 | Paper |
| Related-Key Boomerang Attacks on KATAN32/48/64 | 2013-06-28 | Paper |
| A single-key attack on the full GOST block cipher | 2013-04-15 | Paper |
| Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI | 2013-04-04 | Paper |
| Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 | 2013-01-08 | Paper |
| Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo | 2012-09-07 | Paper |
| Piccolo: An Ultra-Lightweight Blockcipher | 2011-10-07 | Paper |
| A single-key attack on the full GOST block cipher | 2011-07-07 | Paper |
| Preimage Attacks on Reduced Tiger and SHA-2 | 2009-08-11 | Paper |