.- Authenticated Encryption.
.- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes.
.- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems.
.- Symmetric-key Cryptanalysis.
.- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES.
.- Weak Keys of the Full MISTY1 Recovered in Practical Time.
.- Protocols.
.- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening.
.- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing.
.- Analysis of Public-key Cryptosystems.
.- Formal Verification of Emulated Floating-Point Arithmetic in Falcon.
.- Experimental Analysis of Integer Factorization Methods Using Lattices.
.- Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments.
.- Vulnerability.
.- Race condition vulnerabilities in WordPress plug-ins.
.- Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study.
.- Malware Countermeasure.
.- File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.
.- Implementation for Malicious Software using ChatGPT-4.
.- A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud.
.- Network Security and Privacy.
.- Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks.
.- Information Leakage through Packet Lengths in RTC Traffic.
.- A Study on Anonymization through Participation in iPWS Cup 2023.