publications
The peer-reviewed publications are listed in reverse chronological order. More bibliographical information about my publications can be found on my google scholar and dblp pages.
-
Gröbner Basis Cryptanalysis of AnemoiAdvances in Cryptology - EUROCRYPT (To appear), 2025
-
-
On Efficient and Secure Compression Functions for Arithmetization-Oriented HashingIEEE 37th Computer Security Foundations Symposium (CSF), 2024
-
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom FunctionApplied Cryptography and Network Security (ACNS), 2024
-
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksDesigns, Codes and Cryptography, 2023
-
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic EncryptionApplied Cryptography and Network Security (ACNS), Proceedings, Part I, 2023
-
Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test26th International Conference on Information Security and Cryptology, ICISC, 2023
-
Compactness of Hashing Modes and Efficiency Beyond Merkle TreeAdvances in Cryptology - EUROCRYPT, 2021
-
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems30th USENIX Security Symposium (USENIX Security 21), 2021
-
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round FunctionsSelected Areas in Cryptography - SAC, 2020
-
Forkcipher: A New Primitive for Authenticated Encryption of Very Short MessagesAdvances in Cryptology - ASIACRYPT, 2019
-
Feistel Structures for MPC, and MoreComputer Security - ESORICS 2019 - European Symposium on Research in Computer Security, 2019
-
Constructing TI-Friendly Substitution Boxes Using Shift-Invariant PermutationsTopics in Cryptology - CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference, 2019
-
A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AESSmart Card Research and Advanced Applications (CARDIS), 2018
-
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityAdvances in Cryptology - ASIACRYPT, 2016
-
A Brief Comparison of Simon and SimeckLightweight Cryptography for Security and Privacy, LightSec 2016, 2016
-
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel CountermeasuresJournal of Cryptographic Engineering, 2015
-
Differential Analysis of Block Ciphers SIMON and SPECKFast Software Encryption - 21st International Workshop, FSE, 2014
-
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel CountermeasuresCryptographic Hardware and Embedded Systems - CHES, 2014
-
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012Cryptographic Hardware and Embedded Systems - CHES, 2013
-
-
-
Boomerang Attacks on Hash Function Using Auxiliary DifferentialsTopics in Cryptology - CT-RSA 2012, 2012
-