| Publication | Date of Publication | Type |
|---|
| Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing | 2024-12-11 | Paper |
| Compactly committing authenticated encryption using encryptment and tweakable block cipher | 2024-10-16 | Paper |
| Parallel verification of serial MAC and AE modes | 2024-10-14 | Paper |
| Property-preserving hash functions and combinatorial group testing | 2024-06-25 | Paper |
| Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure | 2024-03-14 | Paper |
| XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation | 2023-12-08 | Paper |
| Authenticated encryption for very short inputs | 2023-10-04 | Paper |
| Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication | 2023-06-20 | Paper |
| Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle | 2022-11-09 | Paper |
| Symmetric-key corruption detection: when XOR-MACs meet combinatorial group testing | 2022-08-25 | Paper |
| Efficient Message Authentication Codes with Combinatorial Group Testing | 2022-08-19 | Paper |
| WARP: revisiting GFN for lightweight 128-bit block cipher | 2022-03-25 | Paper |
| ACE in chains: how risky is CBC encryption of binary executable files? | 2021-02-23 | Paper |
| Cryptanalysis of OCB2: attacks on authenticity and confidentiality | 2020-11-06 | Paper |
| Plaintext recovery attacks against XTS beyond collisions | 2020-07-21 | Paper |
| A lightweight alternative to PMAC | 2020-07-21 | Paper |
| Parallelizable authenticated encryption with small state size | 2020-07-21 | Paper |
| Blockcipher-Based Authenticated Encryption: How Small Can We Go? | 2020-06-24 | Paper |
| Blockcipher-based authenticated encryption: how small can we go? | 2020-06-15 | Paper |
| Cryptanalysis of OCB2: attacks on authenticity and confidentiality | 2020-05-20 | Paper |
| XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing | 2020-03-02 | Paper |
| Count-then-permute: a precision-free alternative to inversion sampling | 2020-01-21 | Paper |
| Connecting tweakable and multi-key blockcipher security | 2018-04-06 | Paper |
| ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
| Integrity Analysis of Authenticated Encryption Based on Stream Ciphers | 2017-01-06 | Paper |
| Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) | 2016-09-02 | Paper |
| Tweak-Length Extension for Tweakable Blockciphers | 2016-01-12 | Paper |
| $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms | 2015-12-04 | Paper |
| CLOC: Authenticated Encryption for Short Input | 2015-09-18 | Paper |
| GCM Security Bounds Reconsidered | 2015-09-18 | Paper |
| Attacks and Security Proofs of EAX-Prime | 2015-09-18 | Paper |
| Building blockcipher from small-block tweakable blockcipher | 2015-03-12 | Paper |
| Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions | 2014-05-27 | Paper |
| Improved Authenticity Bound of EAX, and Refinements | 2013-10-23 | Paper |
| A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes | 2013-10-23 | Paper |
| Breaking and Repairing GCM Security Proofs | 2012-09-25 | Paper |
| Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal | 2011-12-16 | Paper |
| On Maximum Differential Probability of Generalized Feistel | 2011-07-07 | Paper |
| Improving the Generalized Feistel | 2010-07-13 | Paper |
| How to Thwart Birthday Attacks against MACs via Small Randomness | 2010-07-13 | Paper |
| Beyond-Birthday-Bound Security Based on Tweakable Block Cipher | 2009-08-11 | Paper |
| Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations | 2009-04-02 | Paper |
| Shorter Bit Sequence Is Enough to Break Stream Cipher LILI-128 | 2008-12-21 | Paper |
| New Bounds for PMAC, TMAC, and XCBC | 2008-09-16 | Paper |
| Tweakable Enciphering Schemes from Hash-Sum-Expansion | 2008-04-11 | Paper |
| Improved Security Analysis of XEX and LRW Modes | 2007-11-29 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |
| Information Security and Cryptology - ICISC 2005 | 2007-05-02 | Paper |