- Symmetric-Key Cryptography and Cryptanalysis.- Forgery Attacks on SipHash.- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial ization Vulnerabilities.- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks.- Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri.- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo.- Strengthening Key Scheduling of AES-256 with Minimal Software Modifications.- Public-Key Encryption.
- Ideal Transformations for Public Key Encryption.- Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs Implicit Rejection.- Digital Signatures and Zero Knowledge.- Compressed Sigma Protocols: New Model and Aggregation Techniques.- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature.- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half Tree.- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption.- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit.
- Cryptographic Protocols and Blockchain.- FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity.- TEAKEX: TESLA-Authenticated Group Key Exchange.- SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies.- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks.- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols.- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain.