publications
The peer-reviewed publications are listed in reverse chronological order. More bibliographical information about my publications can be found on my google scholar and dblp pages.
-
Generalised Triangular Dynamical System: An Algebraic System for Constructing Cryptographic Permutations over Finite FieldsSelected Areas in Cryptography (SAC), 2024
-
-
On Efficient and Secure Compression Functions for Arithmetization-Oriented HashingIEEE 37th Computer Security Foundations Symposium (CSF), 2024
-
Masked Iterate-Fork-Iterate: A New Design Paradigm for Tweakable Expanding Pseudorandom FunctionApplied Cryptography and Network Security (ACNS), 2024
-
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networksDesigns, Codes and Cryptography, 2023
-
PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic EncryptionApplied Cryptography and Network Security (ACNS), Proceedings, Part I, 2023
-
Not Optimal but Efficient: A Distinguisher Based on the Kruskal-Wallis Test26th International Conference on Information Security and Cryptology, ICISC 2023, Revised Selected Papers, Part I, 2023
-
Compactness of Hashing Modes and Efficiency Beyond Merkle TreeAdvances in Cryptology - EUROCRYPT 2021 - International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Part II, 2021
-
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems30th USENIX Security Symposium (USENIX Security 21), 2021
-
Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round FunctionsSelected Areas in Cryptography - SAC, 2020
-
Forkcipher: A New Primitive for Authenticated Encryption of Very Short MessagesAdvances in Cryptology - ASIACRYPT 2019 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II, 2019
-
Feistel Structures for MPC, and MoreComputer Security - ESORICS 2019 - European Symposium on Research in Computer Security, 2019, Proceedings, Part II, 2019
-
Constructing TI-Friendly Substitution Boxes Using Shift-Invariant PermutationsTopics in Cryptology - CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings, 2019
-
A Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AESSmart Card Research and Advanced Applications (CARDIS), 2018
-
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityAdvances in Cryptology - ASIACRYPT 2016 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I, 2016
-
A Brief Comparison of Simon and SimeckLightweight Cryptography for Security and Privacy, LightSec 2016, 2016
-
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel CountermeasuresJournal of Cryptographic Engineering, 2015
-
Differential Analysis of Block Ciphers SIMON and SPECKFast Software Encryption - 21st International Workshop, FSE 2014 Proceedings, 2014
-
Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel CountermeasuresCryptographic Hardware and Embedded Systems - CHES 2014 Proceedings, 2014
-
Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012Cryptographic Hardware and Embedded Systems - CHES 2013 Proceedings, 2013
-
Secure Message Authentication Against Related-Key AttackFast Software Encryption - FSE 2013., 2013
-
-
Boomerang Attacks on Hash Function Using Auxiliary DifferentialsTopics in Cryptology - CT-RSA 2012. Proceedings, 2012
-
Boomerang Attacks on BLAKE-32Fast Software Encryption - 18th International Workshop, FSE 2011., 2011