| Publication | Date of Publication | Type |
|---|
| Feistel ciphers based on a single primitive | 2024-08-30 | Paper |
| Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle | 2022-11-09 | Paper |
| On tight quantum security of HMAC and NMAC in the quantum random oracle model | 2022-03-31 | Paper |
On the (im)possibility of improving the round diffusion of generalized Feistel structures Information Processing Letters | 2021-12-14 | Paper |
Quantum attacks on sum of Even-Mansour pseudorandom functions Information Processing Letters | 2021-10-19 | Paper |
Cryptanalysis of OCB2: attacks on authenticity and confidentiality Journal of Cryptology | 2020-11-06 | Paper |
Blockcipher-based authenticated encryption: how small can we go? Lecture Notes in Computer Science | 2020-06-24 | Paper |
Blockcipher-based authenticated encryption: how small can we go? Journal of Cryptology | 2020-06-15 | Paper |
Cryptanalysis of OCB2: attacks on authenticity and confidentiality Advances in Cryptology – CRYPTO 2019 | 2020-05-20 | Paper |
| 4-round Luby-Rackoff construction is a qPRP | 2020-05-20 | Paper |
| Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-256 | 2020-05-12 | Paper |
| Quantum chosen-ciphertext attacks against Feistel ciphers | 2020-01-28 | Paper |
| Universal forgery and multiple forgeries of MergeMAC and generalized constructions | 2020-01-28 | Paper |
| Analyzing key schedule of \textsc{Simon}: iterative key differences and application to related-key impossible differentials | 2018-10-24 | Paper |
| ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers Provable Security | 2017-01-06 | Paper |
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants Applied Cryptography and Network Security | 2016-10-04 | Paper |
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks Information Security and Cryptology - ICISC 2015 | 2016-05-19 | Paper |
Tweak-length extension for tweakable blockciphers Cryptography and Coding | 2016-01-12 | Paper |
CLOC: authenticated encryption for short input Fast Software Encryption | 2015-09-18 | Paper |
GCM security bounds reconsidered Fast Software Encryption | 2015-09-18 | Paper |
Attacks and security proofs of EAX-prime Fast Software Encryption | 2015-09-18 | Paper |
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs Fast Software Encryption | 2015-09-18 | Paper |
Improved authenticity bound of EAX, and refinements Provable Security | 2013-10-23 | Paper |
Breaking and repairing GCM security proofs Lecture Notes in Computer Science | 2012-09-25 | Paper |
On permutation layer of type 1, source-heavy, and target-heavy generalized Feistel structures Cryptology and Network Security | 2012-07-20 | Paper |
Security of Hash-then-CBC key wrapping revisited Cryptography and Coding | 2011-12-16 | Paper |
Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal Cryptography and Coding | 2011-12-16 | Paper |
OMAC: one-key CBC MAC. Lecture Notes in Computer Science | 2010-01-05 | Paper |
BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption Selected Areas in Cryptography | 2009-12-09 | Paper |
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators Selected Areas in Cryptography | 2009-11-03 | Paper |
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption Fast Software Encryption | 2009-08-11 | Paper |
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security Fast Software Encryption | 2009-04-02 | Paper |
Tweakable Pseudorandom Permutation from Generalized Feistel Structure Provable Security | 2009-01-27 | Paper |
New Covering Radius of Reed–Muller Codes for<tex>$t$</tex>-Resilient Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
The 128-Bit Blockcipher CLEFIA (Extended Abstract) Fast Software Encryption | 2008-09-16 | Paper |
Authenticated Encryption Mode for Beyond the Birthday Bound Security Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2007-11-28 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Round Security and Super-Pseudorandomness of MISTY Type Structure Fast Software Encryption | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2089134 (Why is no real title available?) | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2085196 (Why is no real title available?) | 2004-08-09 | Paper |
Non-cryptographic primitive for pseudorandom permutation. Theoretical Computer Science | 2004-03-14 | Paper |
| scientific article; zbMATH DE number 2043316 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 1962141 (Why is no real title available?) | 2003-08-10 | Paper |
| scientific article; zbMATH DE number 1950615 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1759273 (Why is no real title available?) | 2002-10-13 | Paper |
| scientific article; zbMATH DE number 1740046 (Why is no real title available?) | 2002-05-14 | Paper |
| scientific article; zbMATH DE number 1689014 (Why is no real title available?) | 2002-01-09 | Paper |
| scientific article; zbMATH DE number 1504540 (Why is no real title available?) | 2000-09-12 | Paper |
| scientific article; zbMATH DE number 1504536 (Why is no real title available?) | 2000-09-12 | Paper |