<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>/posts/2012/08/blog-post-1/</loc>
<lastmod>2012-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>/posts/2013/08/blog-post-2/</loc>
<lastmod>2013-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>/posts/2014/08/blog-post-3/</loc>
<lastmod>2014-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>/posts/2012/08/blog-post-4/</loc>
<lastmod>2015-08-14T00:00:00-07:00</lastmod>
</url>
<url>
<loc>/posts/2012/08/blog-post-4/</loc>
<lastmod>2199-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2021-01-01-Automatic-Search-for-Bit-Based-Division-Property</loc>
<lastmod>2021-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2021-01-01-Some-Experimental-Results-on-Quadratic-APN-Functions</loc>
<lastmod>2021-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2022-01-01-Full-Round-Zero-Sum-Distinguishers-on-TinyJAMBU-128-and-TinyJAMBU-192-Keyed-Permutation-in-the-Known-Key-Setting</loc>
<lastmod>2022-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2022-01-01-INT-RUP-Security-of-SAEB-and-TinyJAMBU</loc>
<lastmod>2022-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2023-01-01-Attacking-the-IETFISO-Standard-for-Internal-Re-keying-CTR-ACPKM</loc>
<lastmod>2023-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2023-01-01-Divide-and-Rule-DiFA-Division-Property-Based-Fault-Attacks-on-PRESENT-and-GIFT</loc>
<lastmod>2023-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2023-01-01-Practical-Related-Key-Forgery-Attacks-on-Full-Round-TinyJAMBU-192256</loc>
<lastmod>2023-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2023-01-01-The-QARMAv2-Family-of-Tweakable-Block-Ciphers</loc>
<lastmod>2023-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2024-01-01-BBB-Secure-Arbitrary-Length-Tweak-TBC-from-n-bit-Block-Ciphers</loc>
<lastmod>2024-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2024-01-01-BIZness-Bit-Invariant-Zero-Sum-Property-Based-on-Division-Trail</loc>
<lastmod>2024-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2024-01-01-Partial-Sums-Meet-FFT-Improved-Attack-on-6-Round-AES</loc>
<lastmod>2024-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2024-01-01-Quantum-Key-Recovery-Attacks-on-4-Round-Iterated-Even-Mansour-with-Two-Keys</loc>
<lastmod>2024-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2024-05-01-Partial-Sums-Meet-FFT-Improved-Attack-on-6-Round-AES</loc>
<lastmod>2024-05-01T00:00:00-07:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-AutoDiVer-Automatically-Verifying-Differential-Characteristics-and-Learning-Key-Conditions</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-ChiLow-and-ChiChi-New-Constructions-for-Code-Encryption</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-Cryptanalysis-of-TFHE-friendly-Cipher-FRAST</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-DIFA-Rent-Division-Property-Based-Fault-Attacks-on-DEFAULT-and-BAKSHEESH</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-Differential-Cryptanalysis-of-the-Reduced-Pointer-Authentication-Code-Function-Used-in-Arms-FEAT_PACQARMA3-Feature</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-Differential-MITM-Attack-on-14-round-ARADI</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-HCTR-An-Optimally-Secure-TBC-Based-Accordion-Mode</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-Improved-Key-recovery-Attacks-on-ARADI</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-Simple-vs-vectorial-exploiting-structural-symmetry-to-beat-the-ZeroSum-distinguisher</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2025-01-01-ToFA-Towards-Fault-Analysis-of-GIFT-and-GIFT-like-Ciphers-Leveraging-Truncated-Impossible-Differentials</loc>
<lastmod>2025-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/publication/2026-01-01-EWEMrl-A-White-Box-Secure-Cipher-with-Longevity</loc>
<lastmod>2026-01-01T00:00:00-08:00</lastmod>
</url>
<url>
<loc>/</loc>
</url>
<url>
<loc>/archive-layout-with-content/</loc>
</url>
<url>
<loc>/categories/</loc>
</url>
<url>
<loc>/collection-archive/</loc>
</url>
<url>
<loc>/cv/</loc>
</url>
<url>
<loc>/markdown/</loc>
</url>
<url>
<loc>/non-menu-page/</loc>
</url>
<url>
<loc>/page-archive/</loc>
</url>
<url>
<loc>/portfolio/</loc>
</url>
<url>
<loc>/publications/</loc>
</url>
<url>
<loc>/sitemap/</loc>
</url>
<url>
<loc>/tags/</loc>
</url>
<url>
<loc>/talkmap.html</loc>
</url>
<url>
<loc>/talks/</loc>
</url>
<url>
<loc>/teaching/</loc>
</url>
<url>
<loc>/terms/</loc>
</url>
<url>
<loc>/year-archive/</loc>
</url>
<url>
<loc>/markdown_generator/</loc>
</url>
<url>
<loc>/files/cv.pdf</loc>
<lastmod>2026-02-11T06:41:28-08:00</lastmod>
</url>
<url>
<loc>/talkmap/map.html</loc>
<lastmod>2026-02-11T06:41:28-08:00</lastmod>
</url>
</urlset>
