.- Isogeny-Based Cryptography.
.- Efficient Theta-Based Algorithms for Computing (l, l)-Isogenies on Kummer Surfaces for Arbitrary Odd l.
.- Commuting Ramanujan Graphs and the Random Self-Reducibility of Isogeny Problems.
.- Cryptanalysis.
.- Discrete Gaussian Sampling for BKZ-Reduced Basis.
.- An Efficient Collision Attack on Castryck-Decru-Smith's Hash Function.
.- Heuristic Algorithm for Solving Restricted SVP and its Applications.
.- Cryptanalysis of an Efficient Signature Based on Isotropic Quadratic Forms.
.- Analysis of REDOG: the Pad Thai Attack.
.- Quantum Security.
.- Quantum IND-CPA Security Notions for AEAD.
.- Reducing the Number of Qubits in Solving LWE.
.- Side-Channel Attacks.
.- Single Trace Side-Channel Attack on the MPC-in-the-Head Framework.
.- Et tu, Brute? Side-Channel Assisted Chosen Ciphertext Attacks using Valid Ciphertexts on HQC KEM.
.- Security Notions.
.- Treating Dishonest Ciphertexts in Post-Quantum KEMs - Explicit vs Implicit Rejection in the FO Transform.
.- IND-CPAC: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption.