• Publications
  • Influence
A first case of meningitis/encephalitis associated with SARS-Coronavirus-2
Abstract Novel coronavirus (SARS-Coronavirus-2:SARS-CoV-2) which emerged in Wuhan, China, has spread to multiple countries rapidly. We report the first case of meningitis associated withExpand
  • 782
  • 74
  • PDF
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
TLDR
We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks. Expand
  • 294
  • 36
  • PDF
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption
TLDR
In this article, we revisit the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its limits. Expand
  • 105
  • 20
  • PDF
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
TLDR
This paper shows preimage attacks on one-block MD4 and MD5 reduced to 63 (out of 64) steps. Expand
  • 147
  • 19
GIFT: A Small Present
  • 73
  • 19
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
TLDR
This paper proposes new attacks against reduced SHA-0 and SHA-1 hash functions by analyzing a message schedule that does not consist of permutations but linear combinations of message words. Expand
  • 103
  • 15
  • PDF
Finding Preimages in Full MD5 Faster Than Exhaustive Search
TLDR
We present the first cryptographic preimage attack on the full MD5 hash function. Expand
  • 190
  • 11
  • PDF
Identification of a New Variable Sequence in the P1 Cytadhesin Gene of Mycoplasma pneumoniae: Evidence for the Generation of Antigenic Variation by DNA Recombination between Repetitive Sequences
ABSTRACT A Mycoplasma pneumoniae cytadhesin P1 gene with novel nucleotide sequence variation has been identified. Four clinical strains of M. pneumoniae were found to carry this type of P1 gene. ThisExpand
  • 99
  • 9
  • PDF
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers
  • Y. Sasaki, L. Wang
  • Mathematics, Computer Science
  • Selected Areas in Cryptography
  • 15 August 2012
TLDR
We show that the computation of the XOR sum of the partial decryptions can be divided into two independent parts if the analysis target adopts the Feistel network or its variant. Expand
  • 55
  • 8
Boomerang Connectivity Table: A New Cryptanalysis Tool
TLDR
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the composition of two sub-ciphers \(E_1\circ E_0\) and builds a particular characteristic for E with probability \(p^2q^2\) by combining differential characteristics. Expand
  • 59
  • 8
  • PDF