publications
Dedicated to all Crypto-Lovers.
2025
- TCHESToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials2025
- DCCSimple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisherDes. Codes Cryptogr. 2025
2024
- INDOCRYPT
- SSSSUPI-Rear: Privacy-Preserving Subscription Permanent Identification Strategy in 5G-AKAIn SSS 2024
- ASIACRYPT
- TCHES
2023
- SSSWhere Are the Constants? New Insights on the Role of Round Constant Addition in the SymSum DistinguisherIn SSS 2023
- ACNSDivide and Rule: DiFA - Division Property Based Fault Attacks on PRESENT and GIFTIn Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings 2023
- ACNSTIDAL: Practical Collisions on State-Reduced Keccak VariantsIn Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings 2023
2022
2021
- ToSCBoomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and PholkosIACR Trans. Symmetric Cryptol. 2021