Research
è Symmetric-key Cryptography
Generic Attacks on different types of Feistel schemes.
è Hash Functions
“CRUNCH” Hash functions submitted to SHA-3 NIST
Contest.
è Authentication
Authentication schemes based on Multivariate
Polynomials, and on Rubik’s cubes.
è Historical cryptography
Deciphering of the encrypted
letters of Marie-Antoinette and Marie de Guise.
è Earlier topics
Descriptive Set Theory, Harmonic Analysis, Functional
Analysis.