Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes.- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and cyclic shift.- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size.- From Substitution Box To Threshold.- Tight Security Bound of 2k-LightMAC Plus.- Designing Full-Rate Sponge based AEAD Modes.- Towards Minimizing Tweakable Blockcipher-based Generalized Feistel Net- works.- The Patching Landscape of Elisabeth-4 and the Mixed Filter Permutator Paradigm.
- Elliptic curves, Zero-knowledge proof, Signatures.- Generating Supersingular Elliptic Curves over Fp with Unknown Endmorphism Ring.- Kummer and Hessian meet in the Field of Characteristic 2.- Synchronized Aggregate Signature under Standard Assumption in the Random Oracle Model.- Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies.- Attacks.- A CP-based Automatic Tool for Instantiating Truncated Differential Characteristics.- Falling into Bytes and Pieces - Cryptanalysis of an Apple Patent Application.
- Grover on chosen IV related key attack against GRAIN-128a.- Concrete Time/Memory Trade-Offs in Generalised Stern's ISD Algorithm.- Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2.