| Publication | Date of Publication | Type |
|---|
| Forgery attacks on several beyond-birthday-bound secure MACs | 2024-08-30 | Paper |
| Rotational-XOR Differential Cryptanalysis and an Automatic Framework for AND-RX Ciphers | 2024-03-18 | Paper |
| Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls | 2023-12-08 | Paper |
| Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework | 2023-09-07 | Paper |
| A New General Method of Searching for Cubes in Cube Attacks | 2022-12-21 | Paper |
| Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting | 2022-04-22 | Paper |
| Tweaking key-alternating Feistel block ciphers | 2021-02-23 | Paper |
| Generic attacks on hash combiners | 2020-06-15 | Paper |
| Improved indifferentiability security bound for the prefix-free Merkle-Damgård hash function | 2019-10-31 | Paper |
| Beyond-birthday secure domain-preserving PRFs from a single permutation | 2019-05-24 | Paper |
| Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security | 2018-12-20 | Paper |
| Length-preserving encryption based on single-key tweakable block cipher | 2018-11-07 | Paper |
| Functional graph revisited: updates on (second) preimage attacks on hash combiners | 2017-11-15 | Paper |
| How to build fully secure tweakable blockciphers from classical blockciphers | 2017-02-01 | Paper |
| Analysis of the CAESAR candidate silver | 2016-05-19 | Paper |
| Practical Cryptanalysis of PAES | 2016-04-13 | Paper |
| The usage of counter revisited: second-preimage attack on new Russian standardized hash function | 2016-04-13 | Paper |
| Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$ | 2016-04-08 | Paper |
| Known-key distinguisher on full \(\mathtt{PRESENT}\) | 2015-12-10 | Paper |
| Meet-in-the-middle technique for integral attacks against Feistel ciphers | 2015-12-04 | Paper |
| The parallel-cut meet-in-the-middle attack | 2015-11-19 | Paper |
| Bitwise partial-sum on HIGHT: a new tool for integral analysis against ARX designs | 2015-10-16 | Paper |
| Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5 | 2015-10-01 | Paper |
| The sum can be weaker than each part | 2015-09-30 | Paper |
| Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ | 2015-09-18 | Paper |
| Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds | 2015-09-18 | Paper |
| Security analysis of \textsc{Prince} | 2015-09-18 | Paper |
| Cryptanalysis of JAMBU | 2015-09-18 | Paper |
| Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs | 2015-09-18 | Paper |
| Message extension attack against authenticated encryptions: application to PANDA | 2015-02-10 | Paper |
| Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks | 2014-10-14 | Paper |
| Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC | 2014-09-15 | Paper |
| Updates on generic attacks against HMAC and NMAC | 2014-08-07 | Paper |
| Generic universal forgery attack on iterative hash-based MACs | 2014-05-27 | Paper |
| Analysis of BLAKE2 | 2014-03-28 | Paper |
| An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl | 2014-03-28 | Paper |
| Improved Cryptanalysis of Reduced RIPEMD-160 | 2013-12-10 | Paper |
| Cryptanalysis of HMAC/NMAC-Whirlpool | 2013-12-10 | Paper |
| New generic attacks against hash-based MACs | 2013-12-10 | Paper |
| Comprehensive study of integral analysis on 22-round LBlock | 2013-06-04 | Paper |
| Boomerang distinguishers for full HAS-160 compression function | 2013-04-04 | Paper |
| Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function | 2013-04-04 | Paper |
| Generic Related-Key Attacks for HMAC | 2013-03-19 | Paper |
| Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks | 2013-03-19 | Paper |
| Three-subset meet-in-the-middle attack on reduced XTEA | 2012-07-23 | Paper |
| New truncated differential cryptanalysis on 3D block cipher | 2012-06-29 | Paper |
| Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model | 2011-09-16 | Paper |
| (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach | 2011-02-11 | Paper |
| Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl | 2010-12-07 | Paper |
| Finding preimages of Tiger up to 23 steps | 2010-07-13 | Paper |
| Preimages for step-reduced SHA-2 | 2009-12-15 | Paper |
| How to confirm cryptosystems security: the original Merkle-Damgård is still alive! | 2009-12-15 | Paper |
| Bit-Free Collision: Application to APOP Attack | 2009-10-28 | Paper |
| New Message Difference for MD4 | 2008-09-16 | Paper |
| Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function | 2008-06-13 | Paper |
| Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack | 2008-04-24 | Paper |
| New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 | 2008-04-15 | Paper |