| Publication | Date of Publication | Type |
|---|
| Fully automated differential-linear attacks against ARX ciphers | 2023-10-04 | Paper |
| DEFAULT: cipher level resistance against differential fault attack | 2023-05-12 | Paper |
| The MALICIOUS framework: embedding backdoors into tweakable block ciphers | 2022-12-07 | Paper |
| On the cost of ASIC hardware crackers: a SHA-1 case study | 2021-12-20 | Paper |
| A deeper look at machine learning-based cryptanalysis | 2021-12-08 | Paper |
| The \texttt{Deoxys} AEAD family | 2021-08-10 | Paper |
| GIFT: A Small Present | 2020-06-24 | Paper |
| Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives | 2020-06-24 | Paper |
| From collisions to chosen-prefix collisions application to full SHA-1 | 2020-02-04 | Paper |
| Boomerang Connectivity Table: a new cryptanalysis tool | 2018-07-09 | Paper |
| Looting the LUTs: FPGA optimization of AES and AES-like ciphers for authenticated encryption | 2018-04-26 | Paper |
| ZMAC: a fast tweakable block cipher mode for highly secure message authentication | 2017-10-27 | Paper |
| Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers | 2016-11-30 | Paper |
| The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS | 2016-10-27 | Paper |
| Cryptanalysis of full \texttt{RIPEMD-128} | 2016-10-13 | Paper |
| Freestart Collision for Full SHA-1 | 2016-09-09 | Paper |
| The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function | 2016-04-13 | Paper |
| Collision attack on \({\mathtt Grindahl}\) | 2016-01-11 | Paper |
| Known-Key Distinguisher on Full PRESENT | 2015-12-10 | Paper |
| Practical Free-Start Collision Attacks on 76-step SHA-1 | 2015-12-10 | Paper |
| Implementing Lightweight Block Ciphers on x86 Architectures | 2015-10-01 | Paper |
| Multiple Limited-Birthday Distinguishers and Applications | 2015-10-01 | Paper |
| Security Analysis of PRINCE | 2015-09-18 | Paper |
| Cryptanalysis of JAMBU | 2015-09-18 | Paper |
| Lightweight MDS Involution Matrices | 2015-09-18 | Paper |
| A Very Compact FPGA Implementation of LED and PHOTON | 2015-09-10 | Paper |
| FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison | 2015-07-21 | Paper |
| Improved cryptanalysis of AES-like permutations | 2015-01-07 | Paper |
| Tweaks and Keys for Block Ciphers: The TWEAKEY Framework | 2015-01-06 | Paper |
| Updates on Generic Attacks against HMAC and NMAC | 2014-08-07 | Paper |
| Generic Universal Forgery Attack on Iterative Hash-Based MACs | 2014-05-27 | Paper |
| New Generic Attacks against Hash-Based MACs | 2013-12-10 | Paper |
| Improved Cryptanalysis of Reduced RIPEMD-160 | 2013-12-10 | Paper |
| Limited-Birthday Distinguishers for Hash Functions | 2013-12-10 | Paper |
| Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128 | 2013-09-02 | Paper |
| Cryptanalysis of Full RIPEMD-128 | 2013-05-31 | Paper |
| Generic Related-Key Attacks for HMAC | 2013-03-19 | Paper |
| Improved Rebound Attack on the Finalist Grøstl | 2013-01-08 | Paper |
| Practical Cryptanalysis of ARMADILLO2 | 2013-01-08 | Paper |
| On the (In)Security of IDEA in Various Hashing Modes | 2013-01-08 | Paper |
| Unaligned Rebound Attack: Application to Keccak | 2013-01-08 | Paper |
| SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks | 2012-07-23 | Paper |
| The LED Block Cipher | 2011-10-07 | Paper |
| The PHOTON Family of Lightweight Hash Functions | 2011-08-12 | Paper |
| Analysis of Reduced-SHAvite-3-256 v2 | 2011-07-07 | Paper |
| A Forward-Secure Symmetric-Key Derivation Protocol | 2010-12-07 | Paper |
| Cryptanalysis of the ESSENCE Family of Hash Functions | 2010-11-23 | Paper |
| Distinguishers for the Compression Function and Output Transformation of Hamsi-256 | 2010-10-25 | Paper |
| Improved Differential Attacks for ECHO and Grøstl | 2010-08-24 | Paper |
| Side-Channel Analysis of Six SHA-3 Candidates | 2010-08-17 | Paper |
| Cryptanalysis of ESSENCE | 2010-07-13 | Paper |
| Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations | 2010-07-13 | Paper |
| Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 | 2010-05-04 | Paper |
| Linearization Framework for Collision Attacks: Application to CubeHash and MD6 | 2009-12-15 | Paper |
| Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher | 2009-12-09 | Paper |
| Cryptanalysis of RadioGatún | 2009-08-11 | Paper |
| Inside the Hypercube | 2009-06-25 | Paper |
| Hash Functions and the (Amplified) Boomerang Attack | 2009-03-10 | Paper |
| On Building Hash Functions from Multivariate Quadratic Equations | 2009-03-06 | Paper |
| Slide Attacks on a Class of Hash Functions | 2009-02-10 | Paper |
| How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions | 2009-01-27 | Paper |
| Collisions on SHA-0 in One Hour | 2008-09-18 | Paper |
| Cryptanalysis of FORK-256 | 2008-09-16 | Paper |
| Security Analysis of Constructions Combining FIL Random Oracles | 2008-09-16 | Paper |
| Cryptanalysis of Grindahl | 2008-05-15 | Paper |
| Cryptanalysis of T-Function-Based Hash Functions | 2008-05-06 | Paper |
| Combining Compression Functions and Block Cipher-Based Hash Functions | 2008-04-24 | Paper |
| Linear Cryptanalysis of the TSC Family of Stream Ciphers | 2008-03-18 | Paper |
| Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |