Publications

Hash Functions Monolith for ZK Applications: May the Speed of SHA-3 be With You
Poseidon2: A Faster Version of the Poseidon Hash Function
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Influence of the Linear Layer on the Algebraic Degree in SP-Networks
Practical key recovery attacks on FlexAEAD
From Farfalle to Megafono via Ciminion: The PRF Hydra for MPC Applications
Small MACs from Small Permutations
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n
Reinforced Concrete: A Fast Hash Function for Verifiable Computation
Poseidon: A New Hash Function for Zero-Knowledge Proof Systems
Pasta: A Case for Hybrid Homomorphic Encryption
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy
Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC
Feistel Structures for MPC, and More
Forgery Attacks on FlexAE and FlexAEAD
Algebraic Cryptanalysis of Variants of Frit