Year | Title | Venue |

2017 | Optimal PRFs from Blockcipher Designs | tosc |

2017 | Security of Even-Mansour Ciphers under Key-Dependent Messages | tosc |

2017 | Cryptanalysis of 48-step RIPEMD-160 | tosc |

2017 | Reconsidering the Security Bound of AES-GCM-SIV | tosc |

2017 | Efficient Length Doubling From Tweakable Block Ciphers | tosc |

2017 | Boolean functions with restricted input and their robustness; application to the FLIP cipher | tosc |

2017 | Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper) | tosc |

2017 | Practical Evaluation of FSE 2016 Customized Encoding Countermeasure | tosc |

2017 | Shorter Linear Straight-Line Programs for MDS Matrices | tosc |

2017 | Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3 | tosc |

2017 | Some cryptanalytic results on Lizard | tosc |

2017 | On Leakage-Resilient Authenticated Encryption with Decryption Leakages | tosc |

2017 | Single Key Variant of PMAC_Plus | tosc |

2017 | Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources | tosc |

2017 | Human-readable Proof of the Related-Key Security of AES-128 | tosc |

2017 | Rotational-XOR Cryptanalysis of Reduced-round SPECK | tosc |

2017 | Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures | tosc |

2017 | Modes of Operation Suitable for Computing on Encrypted Data | tosc |

2017 | New Constructions of MACs from (Tweakable) Block Ciphers | tosc |

2017 | Optimizing Implementations of Lightweight Building Blocks | tosc |

2017 | Farfalle: parallel permutation-based cryptography | tosc |

2017 | Turning Online Ciphers Off | tosc |

2017 | Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security | tosc |

2017 | Cryptanalysis of PMACx, PMAC2x, and SIVx | tosc |

2017 | MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics | tosc |

2017 | Understanding RUP Integrity of COLM | tosc |

2017 | Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation | tosc |

2017 | A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers | tosc |

2017 | ZMAC+ - An Efficient Variable-output-length Variant of ZMAC | tosc |

2017 | Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies | tosc |

2017 | Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds | tosc |

2017 | Accurate Estimate of the Advantage of Impossible Differential Attacks | tosc |

2017 | Fast Correlation Attacks on Grain-like Small State Stream Ciphers | tosc |

2017 | Tight Security Analysis of EHtM MAC | tosc |

2017 | Direct Construction of Optimal Rotational-XOR Diffusion Primitives | tosc |

2017 | Merkle's Key Agreement Protocol is Optimal: An O(n^{2}) Attack on Any Key Agreement from Random Oracles | jofc |

2016 | Cryptanalysis of Full RIPEMD-128 | jofc |

2016 | Concurrent Knowledge Extraction in Public-Key Models | jofc |

2017 | Reconciling Non-malleability with Homomorphic Encryption | jofc |

2017 | Lattices with Symmetry | jofc |

2016 | Signature Schemes Secure Against Hard-to-Invert Leakage | jofc |

2017 | Design Methodology and Validity Verification for a Reactive Countermeasure Against EM Attacks | jofc |

2017 | The Security of Tandem-DM in the Ideal Cipher Model | jofc |

2017 | Locally Computable UOWHF with Linear Shrinkage | jofc |

2017 | Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation | jofc |

2016 | New Second-Preimage Attacks on Hash Functions | jofc |

2016 | How to Build an Ideal Cipher: The Indifferentiability of the Feistel Construction | jofc |

2017 | Jacobian Coordinates on Genus 2 Curves | jofc |

2016 | Bug Attacks | jofc |

2017 | Obfuscating Conjunctions | jofc |

2017 | Secret-Sharing for NP | jofc |

2016 | Unconditionally Anonymous Ring and Mesh Signatures | jofc |

2017 | An Algebraic Framework for Diffie-Hellman Assumptions | jofc |

2017 | Dynamic Proofs of Retrievability Via Oblivious RAM | jofc |

2017 | Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces | jofc |

2017 | A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation | jofc |

2017 | Efficient One-Sided Adaptively Secure Computation | jofc |

2016 | Tightly Secure Signatures From Lossy Identification Schemes | jofc |

2017 | More Efficient Oblivious Transfer Extensions | jofc |

2017 | Security of Blind Signatures Revisited | jofc |

2016 | Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes | jofc |

2016 | Breaking RSA May Be As Difficult As Factoring | jofc |

2017 | Integral Cryptanalysis on Full MISTY1 | jofc |

2016 | Secret-Sharing Schemes for Very Dense Graphs | jofc |

2016 | Structure-Preserving Signatures and Commitments to Group Elements | jofc |

2016 | Fast Cryptography in Genus 2 | jofc |

2017 | Instantiability of RSA-OAEP Under Chosen-Plaintext Attack | jofc |

2017 | Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier | jofc |

2016 | An Optimally Fair Coin Toss | jofc |

2017 | Acoustic Cryptanalysis | jofc |

2016 | Leakage-Resilient Cryptography from Minimal Assumptions | jofc |

2017 | Efficient Cryptosystems From 2^{k}-th Power Residue Symbols | jofc |

2017 | The Hunting of the SNARK | jofc |

2017 | Efficient Authentication from Hard Learning Problems | jofc |

2017 | Information Theoretical Cryptogenography | jofc |

2017 | Photonic Side-Channel Analysis of Arbiter PUFs | jofc |

2016 | The ℚ-curve Construction for Endomorphism-Accelerated Elliptic Curves | jofc |

2016 | Automata Evaluation and Text Search Protocols with Simulation-Based Security | jofc |

2017 | Differential-Linear Cryptanalysis Revisited | jofc |

2017 | Weak Locking Capacity of Quantum Channels Can be Much Larger Than Private Capacity | jofc |

2017 | From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back | jofc |

2016 | Efficient Set Intersection with Simulation-Based Security | jofc |

2016 | Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions | jofc |

2017 | Non-malleable Coding Against Bit-Wise and Split-State Tampering | jofc |

2016 | Toward a Game Theoretic View of Secure Computation | jofc |

2016 | Limits on the Usefulness of Random Oracles | jofc |

2016 | Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries | jofc |

2017 | Short Signatures from Diffie-Hellman: Realizing Almost Compact Public Key | jofc |

2017 | Reproducible Circularly Secure Bit Encryption: Applications and Realizations | jofc |

2017 | Authenticated Confidential Channel Establishment and the Security of TLS-DHE | jofc |

2016 | Practical Cryptanalysis of ISO 9796-2 and EMV Signatures | jofc |

2016 | Enhanced Public Key Security for the McEliece Cryptosystem | jofc |

2016 | Garbling XOR Gates "For Free" in the Standard Model | jofc |

2016 | A Dichotomy for Local Small-Bias Generators | jofc |

2018 | Revisiting Variable Output Length XOR Pseudorandom Function | tosc |

2018 | Multivariate Profiling of Hulls for Linear Cryptanalysis | tosc |

2018 | Searching for Subspace Trails and Truncated Differentials | tosc |

2018 | On the Generalization of Butterfly Structure | tosc |

2018 | On Efficient Constructions of Lightweight MDS Matrices | tosc |

2018 | Column Parity Mixers | tosc |