| Publication | Date of Publication | Type |
|---|
| Improving linear key recovery attacks using Walsh spectrum puncturing | 2024-11-12 | Paper |
| Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR | 2024-10-14 | Paper |
| Keyed sum of permutations: a simpler RP-based PRF | 2023-10-04 | Paper |
| A modular approach to the incompressibility of block-cipher-based AEADs | 2023-08-16 | Paper |
| Several MILP-Aided Attacks Against SNOW 2.0 | 2023-06-28 | Paper |
| Strong and tight security guarantees against integral distinguishers | 2023-05-12 | Paper |
| Massive superpoly recovery with nested monomial predictions | 2023-05-12 | Paper |
| Lower bounds on the degree of block ciphers | 2023-03-21 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Improved differential-linear attacks with applications to ARX ciphers | 2022-12-07 | Paper |
| Improved differential-linear attacks with applications to ARX ciphers | 2022-11-14 | Paper |
| New attacks from old distinguishers improved attacks on serpent | 2022-07-06 | Paper |
| PRINCEv2. More security for (almost) no overhead | 2022-03-25 | Paper |
| Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD | 2021-12-01 | Paper |
| Modeling for three-subset division property without unknown subset | 2021-08-10 | Paper |
| On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet | 2020-07-21 | Paper |
| GIFT: A Small Present | 2020-06-24 | Paper |
| Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly | 2020-01-28 | Paper |
| Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 | 2019-11-27 | Paper |
| Cube Attacks on Non-Blackbox Polynomials Based on Division Property | 2019-03-07 | Paper |
| Programming the Demirci-Selçuk meet-in-the-middle attack with constraints | 2019-01-23 | Paper |
| Compact representation for division property | 2018-10-26 | Paper |
| Analyzing key schedule of \textsc{Simon}: iterative key differences and application to related-key impossible differentials | 2018-10-24 | Paper |
| Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 | 2018-09-26 | Paper |
| Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput | 2018-09-14 | Paper |
| Improved division property based cube attacks exploiting algebraic properties of superpoly | 2018-09-12 | Paper |
| Bit-Based Division Property and Application to Simon Family | 2018-05-09 | Paper |
| New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network | 2018-02-16 | Paper |
| Cube attacks on non-blackbox polynomials based on division property | 2017-10-27 | Paper |
| Division property: efficient method to estimate upper bound of algebraic degree | 2017-10-23 | Paper |
| Integral cryptanalysis on full MISTY1 | 2017-10-12 | Paper |
| Improved integral attack on HIGHT | 2017-08-25 | Paper |
| New Impossible Differential Search Tool from Design and Cryptanalysis Aspects | 2017-06-23 | Paper |
| Nonlinear Invariant Attack | 2017-01-06 | Paper |
| Wide Trail Design Strategy for Binary MixColumns | 2016-10-04 | Paper |
| Integral Cryptanalysis on Full MISTY1 | 2015-12-10 | Paper |
| Structural Evaluation by Generalized Integral Property | 2015-09-30 | Paper |
| How Much Can Complexity of Linear Cryptanalysis Be Reduced? | 2015-09-11 | Paper |
| Cryptanalysis of Reduced-Round SIMON32 and SIMON48 | 2015-09-10 | Paper |
| FFT Key Recovery for Integral Attack | 2015-02-10 | Paper |
| New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA | 2014-09-15 | Paper |
| Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions | 2014-03-25 | Paper |
| Upper Bounds for the Security of Several Feistel Networks | 2013-06-28 | Paper |