Recent Publications

More Publications

We give the first practical instance – BISON – of the Whitened Swap-Or-Not construction. After clarifying inherent limitations of the …

Grassi et al. introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five …

Recently a lot of attention is paid to the search for efficiently implementable MDS matrices for lightweight symmetric primitives. Most …

This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule …

One of the most attractive problems for post-quantum secure cryptographic schemes is the LWE problem. Beside combinatorial and …

Recent & Upcoming Talks

More Talks

We give the first practical instance – BISON – of the Whitened Swap-Or-Not construction. After clarifying inherent limitations of the …

We give the first practical instance – BISON – of the Whitened Swap-Or-Not construction. After clarifying inherent limitations of the …

Grassi et al. introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five …

We summarize the recent trend of XOR count papers and discuss applications of related work not done so far.

The Invariant Set Attack, or Nonlinear Invariant Attack, was proposed by Todo, Leander, and Sasaki at AsiaCrypt’16. In this short …

Recent Posts

Write-Up for my hack.lu 2018 challenge ‘LFSR StreamCipher’

Teaching

I am involved in following courses at Ruhr University Bochum:

Contact