| Publication | Date of Publication | Type |
|---|
| Cryptanalysis of algebraic verifiable delay functions | 2024-12-13 | Paper |
| Improving generic attacks using exceptional functions | 2024-12-13 | Paper |
| New representations of the AES key schedule | 2024-11-15 | Paper |
| Partial sums meet FFT: improved attack on 6-round AES | 2024-11-12 | Paper |
| Truncated boomerang attacks and application to AES-based ciphers | 2023-12-08 | Paper |
| QCB: efficient quantum-secure authenticated encryption | 2023-05-12 | Paper |
| Clustering effect in \textsc{Simon} and \textsc{Simeck} | 2023-05-12 | Paper |
| Quantum linearization attacks | 2023-05-12 | Paper |
| New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions | 2023-03-21 | Paper |
| Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems | 2022-12-07 | Paper |
| Practical key recovery attacks on FlexAEAD | 2022-03-31 | Paper |
| On the cost of ASIC hardware crackers: a SHA-1 case study | 2021-12-20 | Paper |
| New representations of the AES key schedule | 2021-12-08 | Paper |
| Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2 | 2021-12-08 | Paper |
| Internal symmetries and linear properties: full-permutation distinguishers and improved collisions on \textsf{Gimli} | 2021-11-24 | Paper |
| Universal forgery attack against GCM-RUP | 2020-08-05 | Paper |
| Generic attacks on hash combiners | 2020-06-15 | Paper |
| Low-memory attacks against two-round Even-Mansour using the 3-XOR problem | 2020-03-09 | Paper |
| From collisions to chosen-prefix collisions application to full SHA-1 | 2020-02-04 | Paper |
| Cryptanalysis of MORUS | 2019-01-23 | Paper |
| Generic attacks against beyond-birthday-bound MACs | 2018-09-12 | Paper |
| The Missing Difference problem, and its applications to counter mode encryption | 2018-07-09 | Paper |
| Key Recovery Attack Against 2.5-Round $$\pi $$ -Cipher | 2018-05-09 | Paper |
| Improved generic attacks against hash-based MACs and HAIFA | 2018-01-05 | Paper |
| Breaking Symmetric Cryptosystems Using Quantum Period Finding | 2016-10-27 | Paper |
| Improved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning | 2016-09-09 | Paper |
| Construction of Lightweight S-Boxes Using Feistel and MISTY Structures | 2016-05-19 | Paper |
| Cryptanalysis of Feistel Networks with Secret Round Functions | 2016-05-19 | Paper |
| Differential Forgery Attack Against LAC | 2016-05-19 | Paper |
| The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function | 2016-04-13 | Paper |
| Collision Attacks Against CAESAR Candidates | 2016-03-23 | Paper |
| Cryptanalysis of the “Kindle” Cipher | 2015-12-04 | Paper |
| The Sum Can Be Weaker Than Each Part | 2015-09-30 | Paper |
| Cryptanalysis of WIDEA | 2015-09-18 | Paper |
| LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations | 2015-09-18 | Paper |
| SPRING: Fast Pseudorandom Functions from Rounded Ring Products | 2015-09-18 | Paper |
| Time-Memory Trade-Offs for Near-Collisions | 2015-09-18 | Paper |
| FPGA Implementations of SPRING | 2015-07-21 | Paper |
| Improved Generic Attacks against Hash-Based MACs and HAIFA | 2014-08-07 | Paper |
| Hardware Implementation and Side-Channel Analysis of Lapin | 2014-03-28 | Paper |
| New Generic Attacks against Hash-Based MACs | 2013-12-10 | Paper |
| Construction of Differential Characteristics in ARX Designs Application to Skein | 2013-09-02 | Paper |
| Analysis of Differential Attacks in ARX Constructions | 2013-03-19 | Paper |
| Narrow-Bicliques: Cryptanalysis of Full IDEA | 2012-06-29 | Paper |
| Boomerang Attacks on Hash Function Using Auxiliary Differentials | 2012-06-08 | Paper |
| New Insights on Impossible Differential Cryptanalysis | 2012-06-08 | Paper |
| Practical Near-Collisions on the Compression Function of BMW | 2011-07-07 | Paper |
| Attacks on Hash Functions Based on Generalized Feistel: Application to Reduced-Round Lesamnta and SHAvite-3 512 | 2011-03-15 | Paper |
| Security Analysis of SIMD | 2011-03-15 | Paper |
| Another Look at Complementation Properties | 2010-07-13 | Paper |
| Cryptanalysis of ESSENCE | 2010-07-13 | Paper |
| Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 | 2010-05-04 | Paper |
| Practical Key Recovery Attack against Secret-IV Edon- $\mathcal R$ | 2010-03-16 | Paper |
| How Risky Is the Random-Oracle Model? | 2009-10-20 | Paper |
| Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | 2009-03-10 | Paper |
| Practical key-recovery attack against APOP, an MD5-based challenge-response authentication | 2009-01-15 | Paper |
| MD4 is Not One-Way | 2008-09-18 | Paper |
| Message Freedom in MD4 and MD5 Collisions: Application to APOP | 2008-09-16 | Paper |
| Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes | 2008-04-24 | Paper |
| An Analysis of the XSL Algorithm | 2008-03-18 | Paper |