2025
Corrigendum to Fast AES-Based Universal Hash Functions and MACs.
IACR Trans. Symmetric Cryptol., 2025
ChiLow and ChiChi: New Constructions for Code Encryption.
,
,
,
,
,
,
,
,
,
,
IACR Cryptol. ePrint Arch., 2025
Transistor: a TFHE-friendly Stream Cipher.
,
,
,
,
,
,
,
,
,
,
IACR Cryptol. ePrint Arch., 2025
2024
Fast AES-Based Universal Hash Functions and MACs Featuring LeMac and PetitMac.
IACR Trans. Symmetric Cryptol., 2024
Security Analysis of XHASH8/12.
IACR Cryptol. ePrint Arch., 2024
Commutative Cryptanalysis as a Generalization of Differential Cryptanalysis.
IACR Cryptol. ePrint Arch., 2024
The Algebraic Freelunch Efficient Gröbner Basis Attacks Against Arithmetization-Oriented Primitives.
IACR Cryptol. ePrint Arch., 2024
2023
On the algebraic degree of iterated power functions.
Des. Codes Cryptogr., March, 2023
Propagation of Subspaces in Primitives with Monomial Sboxes: Applications to Rescue and Variants of the AES.
IACR Trans. Symmetric Cryptol., 2023
Commutative Cryptanalysis Made Practical.
IACR Trans. Symmetric Cryptol., 2023
New Design Techniques for Efficient Arithmetization-Oriented Hash Functions: ttAnemoi Permutations and ttJive Compression Mode.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Supplementary code to "Trims and extensions of quadratic APN functions".
Dataset, January, 2022
Quadratic APN Extensions.
Dataset, January, 2022
Practical Cube Attack against Nonce-Misused Ascon.
IACR Trans. Symmetric Cryptol., 2022
Algebraic Attacks against Some Arithmetization-Oriented Primitives.
IACR Trans. Symmetric Cryptol., 2022
Recovering or Testing Extended-Affine Equivalence.
IEEE Trans. Inf. Theory, 2022
Anemoi: Exploiting the Link between Arithmetization-Orientation and CCZ-Equivalence.
IACR Cryptol. ePrint Arch., 2022
A further study of quadratic APN permutations in dimension nine.
Finite Fields Their Appl., 2022
Trims and extensions of quadratic APN functions.
Des. Codes Cryptogr., 2022
Constructing more quadratic APN functions with the QAM method.
Cryptogr. Commun., 2022
2021
Quadratic APN Extensions.
Dataset, August, 2021
MOE: Multiplication Operated Encryption with Trojan Resilience.
IACR Trans. Symmetric Cryptol., 2021
Internal Symmetries and Linear Properties: Full-permutation Distinguishers and Improved Collisions on Gimli.
J. Cryptol., 2021
2020
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
IACR Trans. Symmetric Cryptol., 2020
Lightweight AEAD and Hashing using the Sparkle Permutation Family.
IACR Trans. Symmetric Cryptol., 2020
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE.
J. Cryptol., 2020
New results on Gimli: full-permutation distinguishers and improved collisions.
IACR Cryptol. ePrint Arch., 2020
Cryptanalysis Results on Spook.
IACR Cryptol. ePrint Arch., 2020
On the security of the Rescue hash function.
IACR Cryptol. ePrint Arch., 2020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
,
,
,
,
,
,
,
,
,
,
IACR Cryptol. ePrint Arch., 2020
Boomerang uniformity of popular S-box constructions.
Des. Codes Cryptogr., 2020
On subspaces of Kloosterman zeros and permutations of the form L<sub>1</sub>(x<sup>-1</sup>)+L<sub>2</sub>(x).
CoRR, 2020
On Subspaces of Kloosterman Zeros and Permutations of the Form L<sub>1(x<sup>-1</sup>)+L<sub>2(x)</sub></sub>.
Proceedings of the Arithmetic of Finite Fields - 8th International Workshop, 2020
Cryptanalysis Results on Spook - Bringing Full-Round Shadow-512 to the Light.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX).
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Partitions in the S-Box of Streebog and Kuznyechik.
IACR Trans. Symmetric Cryptol., 2019
Triathlon of lightweight block ciphers for the Internet of things.
J. Cryptogr. Eng., 2019
Probability 1 Iterated Differential in the SNEIK Permutation.
IACR Cryptol. ePrint Arch., 2019
Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs.
IACR Cryptol. ePrint Arch., 2019
Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering.
IACR Cryptol. ePrint Arch., 2019
Alzette: A 64-bit ARX-box.
IACR Cryptol. ePrint Arch., 2019
Feistel Structures for MPC, and More.
IACR Cryptol. ePrint Arch., 2019
On CCZ-equivalence, extended-affine equivalence, and function twisting.
Finite Fields Their Appl., 2019
If a generalised butterfly is APN then it operates on 6 bits.
Cryptogr. Commun., 2019
Anomalies and Vector Space Search: Tools for S-Box Analysis.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2017
Cryptanalysis, Reverse-Engineering and Design of Symmetric Cryptographic Algorithms.
PhD thesis, 2017
A Generalisation of Dillon's APN Permutation With the Best Known Differential and Nonlinear Properties for All Fields of Size 2<sup>4k+2</sup>.
IEEE Trans. Inf. Theory, 2017
Improvements to the Linear Layer of LowMC: A Faster Picnic.
IACR Cryptol. ePrint Arch., 2017
State of the Art in Lightweight Symmetric Cryptography.
IACR Cryptol. ePrint Arch., 2017
Symmetrically and Asymmetrically Hard Cryptography.
IACR Cryptol. ePrint Arch., 2017
2016
Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog.
IACR Trans. Symmetric Cryptol., 2016
Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs.
IACR Trans. Symmetric Cryptol., 2016
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version).
IACR Cryptol. ePrint Arch., 2016
Algebraic Insights into the Secret Feistel Network (Full version).
IACR Cryptol. ePrint Arch., 2016
Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version).
IACR Cryptol. ePrint Arch., 2016
A generalisation of Dillon's APN permutation with the best known differential and linear properties for all fields of size 2<sup>4k+2</sup>.
IACR Cryptol. ePrint Arch., 2016
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1.
IACR Cryptol. ePrint Arch., 2016
Algebraic Insights into the Secret Feistel Network.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Design Strategies for ARX with Provable Bounds: Sparx and LAX.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob.
IACR Cryptol. ePrint Arch., 2015
On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure.
IACR Cryptol. ePrint Arch., 2015
Cryptanalysis of Feistel Networks with Secret Round Functions.
IACR Cryptol. ePrint Arch., 2015
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE.
IACR Cryptol. ePrint Arch., 2015
2014
Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64.
IACR Cryptol. ePrint Arch., 2014
More differentially 6-uniform power functions.
Des. Codes Cryptogr., 2014