.- Code-Based Cryptography.
.- On the Structure of the Schur Squares of Twisted Generalized Reed-Solomon Codes and Application to Cryptanalysis.
.- Quadratic Modelings of Syndrome Decoding.
.- An Improved Algorithm for Code Equivalence.
.- An Improved Both-May Information Set Decoding Algorithm: Towards More Efficient Time-Memory Trade-Offs.
.- Enhancing Threshold Group Action Signature Schemes: Adaptive Security and Scalability Improvements.
.- Multivariate Cryptography.
.- Share the MAYO: Thresholdizing MAYO.
.- SoK: On the Physical Security of UOV-based Signature Schemes.
.- Shifting our Knowledge of MQ-Sign Security.
.- Lattice-Based Cryptography.
.- Module Learning With Errors With Truncated Matrices.
.- Lattice-Based Sanitizable Signature Schemes: Chameleon Hash Functions and More.
.- Giant Does NOT Mean Strong: Cryptanalysis of BQTRU.
.- Batch Anonymous MAC Tokens from Lattices.