| Publication | Date of Publication | Type |
|---|
| Vectorial fast correlation attacks | 2026-03-31 | Paper |
Link between the differential cryptanalysis and linear approximations over finite abelian groups and its applications Journal of Cryptology | 2026-03-09 | Paper |
| Speeding up preimage and key-recovery attacks with highly biased differential-linear approximations | 2024-12-13 | Paper |
| A closer look at the S-box: deeper analysis of round-reduced ASCON-HASH | 2024-10-16 | Paper |
| Automatic Demirci-Selçuk meet-in-the-middle attack on SKINNY with key-bridging | 2024-04-19 | Paper |
| Convolutional neural network based side-channel attacks with customized filters | 2024-04-19 | Paper |
Synthesizing quantum circuits of AES with lower \(T\)-depth and less qubits Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy Developments in Language Theory | 2023-06-30 | Paper |
Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials Lecture Notes in Computer Science | 2023-05-12 | Paper |
Massive superpoly recovery with nested monomial predictions Lecture Notes in Computer Science | 2023-05-12 | Paper |
New cryptanalysis of LowMC with algebraic techniques Designs, Codes and Cryptography | 2023-04-28 | Paper |
| Quantum circuit implementations of AES with fewer qubits | 2023-03-21 | Paper |
| An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums | 2023-03-21 | Paper |
Rotational differential-linear cryptanalysis revisited Journal of Cryptology | 2023-01-05 | Paper |
Some efficient quantum circuit implementations of Camellia Quantum Information Processing | 2022-11-29 | Paper |
| Key guessing strategies for linear key-schedule algorithms in rectangle attacks | 2022-08-30 | Paper |
Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK Information Security Practice and Experience | 2022-08-11 | Paper |
| Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks | 2022-04-22 | Paper |
| Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys | 2021-12-20 | Paper |
| Rotational cryptanalysis from a differential-linear perspective. Practical distinguishers for round-reduced \texttt{FRIET}, \texttt{Xoodoo}, and \texttt{Alzette} | 2021-12-08 | Paper |
| Automatic search of meet-in-the-middle preimage attacks on AES-like hashing | 2021-12-08 | Paper |
| Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS | 2020-03-09 | Paper |
| Programming the Demirci-Selçuk meet-in-the-middle attack with constraints | 2019-01-23 | Paper |
| Improved differential analysis of block cipher PRIDE | 2018-12-07 | Paper |
| Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s | 2018-10-24 | Paper |
| Related-key impossible differential analysis of full Khudra | 2018-10-24 | Paper |
| Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis | 2018-10-18 | Paper |
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck Fast Software Encryption | 2018-05-09 | Paper |
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks Information Security and Cryptology | 2015-12-02 | Paper |
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\) Science China. Mathematics | 2015-10-27 | Paper |
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers Lecture Notes in Computer Science | 2015-01-16 | Paper |
New constructions of APN polynomial functions in odd characteristic Applicable Algebra in Engineering, Communication and Computing | 2014-10-02 | Paper |
Constructing new differentially 4-uniform permutations from the inverse function Finite Fields and their Applications | 2014-02-05 | Paper |
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem Information and Communications Security | 2013-04-08 | Paper |
Cube cryptanalysis of Hitag2 stream cipher Cryptology and Network Security | 2012-07-20 | Paper |