| Publication | Date of Publication | Type |
|---|
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing Designs, Codes and Cryptography | 2024-12-11 | Paper |
Compactly committing authenticated encryption using encryptment and tweakable block cipher | 2024-10-16 | Paper |
Parallel verification of serial MAC and AE modes | 2024-10-14 | Paper |
Property-preserving hash functions and combinatorial group testing | 2024-06-25 | Paper |
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure | 2024-03-14 | Paper |
XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Authenticated encryption for very short inputs Topics in Cryptology – CT-RSA 2023 | 2023-10-04 | Paper |
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication Designs, Codes and Cryptography | 2023-06-20 | Paper |
Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle | 2022-11-09 | Paper |
Symmetric-key corruption detection: when XOR-MACs meet combinatorial group testing | 2022-08-25 | Paper |
Efficient message authentication codes with combinatorial group testing Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
WARP: revisiting GFN for lightweight 128-bit block cipher | 2022-03-25 | Paper |
ACE in chains: how risky is CBC encryption of binary executable files? | 2021-02-23 | Paper |
Cryptanalysis of OCB2: attacks on authenticity and confidentiality Journal of Cryptology | 2020-11-06 | Paper |
Plaintext recovery attacks against XTS beyond collisions | 2020-07-21 | Paper |
A lightweight alternative to PMAC | 2020-07-21 | Paper |
Parallelizable authenticated encryption with small state size | 2020-07-21 | Paper |
Blockcipher-based authenticated encryption: how small can we go? Lecture Notes in Computer Science | 2020-06-24 | Paper |
Blockcipher-based authenticated encryption: how small can we go? Journal of Cryptology | 2020-06-15 | Paper |
Cryptanalysis of OCB2: attacks on authenticity and confidentiality Advances in Cryptology – CRYPTO 2019 | 2020-05-20 | Paper |
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing | 2020-03-02 | Paper |
Count-then-permute: a precision-free alternative to inversion sampling | 2020-01-21 | Paper |
Connecting tweakable and multi-key blockcipher security Designs, Codes and Cryptography | 2018-04-06 | Paper |
ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers Provable Security | 2017-01-06 | Paper |
Authenticated encryption with small stretch (or, how to accelerate AERO) Information Security and Privacy | 2016-09-02 | Paper |
Tweak-length extension for tweakable blockciphers Cryptography and Coding | 2016-01-12 | Paper |
$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms Selected Areas in Cryptography | 2015-12-04 | Paper |
CLOC: authenticated encryption for short input Fast Software Encryption | 2015-09-18 | Paper |
GCM security bounds reconsidered Fast Software Encryption | 2015-09-18 | Paper |
Attacks and security proofs of EAX-prime Fast Software Encryption | 2015-09-18 | Paper |
Building blockcipher from small-block tweakable blockcipher Designs, Codes and Cryptography | 2015-03-12 | Paper |
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Improved authenticity bound of EAX, and refinements Provable Security | 2013-10-23 | Paper |
A short universal hash function from bit rotation, and applications to blockcipher modes Provable Security | 2013-10-23 | Paper |
Breaking and repairing GCM security proofs Lecture Notes in Computer Science | 2012-09-25 | Paper |
Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal Cryptography and Coding | 2011-12-16 | Paper |
On maximum differential probability of generalized Feistel Information Security and Privacy | 2011-07-07 | Paper |
Improving the generalized Feistel Fast Software Encryption | 2010-07-13 | Paper |
How to Thwart Birthday Attacks against MACs via Small Randomness Fast Software Encryption | 2010-07-13 | Paper |
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher Fast Software Encryption | 2009-08-11 | Paper |
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations Fast Software Encryption | 2009-04-02 | Paper |
Shorter Bit Sequence Is Enough to Break Stream Cipher LILI-128 IEEE Transactions on Information Theory | 2008-12-21 | Paper |
New Bounds for PMAC, TMAC, and XCBC Fast Software Encryption | 2008-09-16 | Paper |
Tweakable Enciphering Schemes from Hash-Sum-Expansion Lecture Notes in Computer Science | 2008-04-11 | Paper |
Improved Security Analysis of XEX and LRW Modes Selected Areas in Cryptography | 2007-11-29 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |