| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2011 | Automatic Search of Attacks on Round-Reduced AES and Applications | crypto | 165 |
| 2 | 2011 | Practical Key-Recovery for All Possible Parameters of SFLASH | asiacrypt | 667-685 |
| 3 | 2011 | Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem | pkc | 473 |
| 4 | 2010 | Fast Exhaustive Search for Polynomial Systems in $F_2$ | eprint | online |
| 5 | 2010 | Fast Exhaustive Search for Polynomial Systems in F2 | ches | 203-218 |
| 6 | 2010 | Security Analysis of SIMD | eprint | online |
| 7 | 2010 | Another Look at Complementation Properties | fse | 347-364 |
| 8 | 2009 | On the Security of Iterated Hashing based on Forgery-resistant Compression Functions | eprint | online |
| 9 | 2008 | Second Preimage Attacks on Dithered Hash Functions | eurocrypt | 270-288 |
| 10 | 2007 | Second Preimage Attacks on Dithered Hash Functions | eprint | online |
Coauthors of Charles Bouillaguet |