è Symmetric-key Cryptography

Generic Attacks on different types of Feistel schemes.


è Hash Functions

“CRUNCH” Hash functions submitted to SHA-3 NIST Contest.


è Authentication

Authentication schemes based on Multivariate Polynomials, and on Rubik’s cubes.


è Historical cryptography

Deciphering of the encrypted letters of Marie-Antoinette and Marie de Guise.


è Earlier topics

Descriptive Set Theory, Harmonic Analysis, Functional Analysis.



List of Publications