Research

 

è Symmetric-key Cryptography

Generic Attacks on different types of Feistel schemes.

 

è Hash Functions

“CRUNCH” Hash functions submitted to SHA-3 NIST Contest.

 

è Authentication

Authentication schemes based on Multivariate Polynomials, and on Rubik’s cubes.

 

è Historical cryptography

Deciphering of the encrypted letters of Marie-Antoinette and Marie de Guise.

 

è Earlier topics

Descriptive Set Theory, Harmonic Analysis, Functional Analysis.

 

 

List of Publications