publications
publications are listed in reversed chronological order (generated by jekyll-scholar).
More bibliographical information about my publications can be found on my google scholar and DBLP pages.
2024
- ACM ASIACCSSkye: A Fast KDF based on Expanding PRF and its ApplicationsIn ACM Asia Conference on Computer and Communications Security, 2024
2023
- DCCQuantum Cryptanalysis of Farfalle and (Generalised) Feistel NetworkDesigns Codes and Cryptography, 2023
- ACNSPIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic EncryptionIn ACNS, 2023
2021
- EUROCRYPTCompactness of Hashing Modes and Efficiency beyond Merkle TreeIn Eurocrypt, 2021
- USENIXPoseidon: A New Hash Function for Zero-Knowledge Proof SystemsIn USENIX Security Symposium, USENIX Proceedings, 2021
2020
- SACInterpolation Cryptanalysis of UFNs with Low Degree Round FunctionsIn Selected Areas in Cryptography - SAC, 2020
2019
- ASIACRYPTForkcipher: A New Primitive for Authenticated Encryption of Very Short MessagesIn Advances in Cryptology - ASIACRYPT 2019 Proceedings, 2019
- NIST LWCForkAE v.1.0In NIST LW Crypto Competition (Round 2), 2019
- CT-RSAConstructing TI-Friendly Substitution Boxes Using Shift-Invariant PermutationsIn Topics in Cryptology - CT-RSA 2019, Proceedings, 2019
- ESORICSFeistel Structures for MPC, and MoreIn Computer Security - ESORICS 2019 - European Symposium on Research in Computer Security, Proceedings, Part II, 2019
2018
- CARDISA Systematic Study of the Impact of Graphical Models on Inference-Based Attacks on AESIn Smart Card Research and Advanced Applications, International Conference, CARDIS, 2018
2016
- ASIACRYPTMiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative ComplexityIn Advances in Cryptology - ASIACRYPT 2016, Proceedings, Part I, 2016
- LightSecA Brief Comparison of Simon and SimeckIn Lightweight Cryptography for Security and Privacy - 2016, Selected Papers, 2016
2015
- J. Cryptogr. Eng.Fast evaluation of polynomials over binary finite fields and application to side-channel countermeasuresJournal of Cryptographic Engineering., 2015
2014
- CHESFast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel CountermeasuresIn Cryptographic Hardware and Embedded Systems - CHES 2014. Proceedings, 2014
- FSE
2013
- CHESAnalysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012In Cryptographic Hardware and Embedded Systems - CHES. Proceedings, 2013
- FSE
2012
- CT-RSABoomerang Attacks on Hash Function Using Auxiliary DifferentialsIn Topics in Cryptology - CT-RSA 2012 - The Cryptographers’ Track at the RSA Conference. Proceedings, 2012
- SACCryptanalysis of the "Kindle" CipherIn Selected Areas in Cryptography, International Conference, SAC, 2012
2011
- FSEBoomerang Attacks on BLAKE-32In Fast Software Encryption, FSE, 2011