A selection of publications.

See also: Google Scholar and DBLP.

Most Recent

Probabilistic Related-Key Statistical Saturation Cryptanalysis

Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang

SAC 2023, LNCS vol. 14201, pp. 213–232 (2024)

Key Committing Security of AEZ and More

Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo

ToSC 2023(4), pp. 452-488 (2023)

Exploring Formal Methods for Cryptographic Hash Function Implementations

Nicky Mouha

ACISP 2023, LNCS vol. 13915, pp. 177-195 (2023)

A Vulnerability in Implementations of SHA-3, SHAKE, EdDSA, and Other NIST-Approved Algorithms

Nicky Mouha, Christopher Celi

CT-RSA 2023, LNCS vol. 13871, pp. 3-28 (2023)

International Standards

Advanced Encryption Standard (AES)

National Institute of Standards and Technology

NIST FIPS 197-upd1, 46 pages (2023)



ISO/IEC 29192-6:2019, 20 pages (2019)

Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

Elaine Barker, Nicky Mouha

NIST Special Publication 800-67 Revision 2, 32 pages (2017)

International Journals

Revisiting the Extension of Matsui’s Algorithm 1 to Linear Hulls: Application to TinyJAMBU

Muzhou Li, Nicky Mouha, Ling Sun, Meiqin Wang

ToSC 2022(2), pp. 161-200 (2022)

T5: Hashing Five Inputs with Three Compression Calls

Yevgeniy Dodis, Dmitry Khovratovich, Nicky Mouha, Mridul Nandi

ITC 2021, Leibniz International Proceedings in Informatics, pp. 24:1–24:23 (2021)

Maximums of the Additive Differential Probability of Exclusive-Or

Nicky Mouha, Nikolay Kolomeec, Danil Akhtiamov, Ivan Sutormin, Matvey Panferov, Kseniya Titova, Tatiana Bonich, Evgeniya Ishchukova, Natalia Tokareva, Bulat Zhantulikov

ToSC 2021(2), pp. 292-313 (2021)

The Application of Formal Methods to Real-World Cryptographic Algorithms, Protocols and Systems

Nicky Mouha, Asmaa Hailane

IEEE Computer, 54(1), pp. 29-38 (2021)

Finding Bugs in Cryptographic Hash Function Implementations

Nicky Mouha, Mohammad S Raunak, D. Richard Kuhn, Raghu Kacker

IEEE Transactions on Reliability, 67(3), pp. 870-884 (2018)

Psst, Can You Keep a Secret?

Apostol Vassilev, Nicky Mouha, Luís Brandão

IEEE Computer, 51(1), pp. 94-97 (2018)

Meet-in-the-Middle Attacks on Reduced-Round GOST

Gautham Sekar, Nicky Mouha, Bart Preneel

Mathematical Aspects of Cryptography, 5(2), pp. 117-125 (2014)

Challenging the Increased Resistance of Regular Hash Functions Against Birthday Attacks

Nicky Mouha, Gautham Sekar, Bart Preneel

Journal of Mathematical Cryptology 6(3-4), pp. 229-248 (2012)

NIST Interagency Reports (NISTIRs)

Report on the Block Cipher Modes of Operation in the NIST SP 800-38 Series

Nicky Mouha, Morris Dworkin

Draft NISTIR 8459, 39 pages (2023)

Review of the Advanced Encryption Standard

Nicky Mouha

NISTIR 8319, 21 pages (2021)

Threshold Schemes for Cryptographic Primitives: Challenges and Opportunities in Standardization and Validation of Threshold Cryptography

Luís T. A. N. Brandão, Nicky Mouha, Apostol Vassilev

NISTIR 8214, 63 pages (2019)

Report on Lightweight Cryptography

Kerry McKay, Lawrence Bassham, Meltem Sönmez Turan, Nicky Mouha

NISTIR 8114, 27 pages (2017)

Lecture Notes in Computer Science

Extending NIST’s CAVP Testing of Cryptographic Hash Function Implementations

Nicky Mouha, Christopher Celi

CT-RSA 2020, LNCS vol. 12006, pp. 129-145 (2020)

The Iterated Random Function Problem

Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Nicky Mouha, Mridul Nandi

ASIACRYPT 2017, LNCS vol. 10625, pp. 667-697 (2017)

Full Disk Encryption: Bridging Theory and Practice

Louiza Khati, Nicky Mouha, Damien Vergnaud

CT-RSA 2017, LNCS vol. 10159, pp. 1-17 (2016)

Simpira v2: A Family of Efficient Permutations Using the AES Round Function

Shay Gueron, Nicky Mouha

ASIACRYPT 2016, LNCS vol. 10031, pp. 95-125 (2016)

Multi-Key Security: The Even-Mansour Construction Revisited

Nicky Mouha, Atul Luykx

CRYPTO 2015, LNCS vol. 9215, pp. 209-223 (2015)

How to Securely Release Unverified Plaintext in Authenticated Encryption

Elena Andreeva, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda

ASIACRYPT 2014, LNCS vol. 8873, pp. 105-125 (2014)

Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers

Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, Ingrid Verbauwhede

SAC 2014, LNCS vol. 8781, pp. 1-18 (2014)

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography

Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda

FSE 2014, LNCS vol. 8540, pp. 1-19 (2015)

UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX

Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel

FSE 2012, LNCS vol. 7549, pp. 287-305 (2012)

Differential and Linear Cryptanalysis using Mixed-Integer Linear Programming

Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel

Inscrypt 2011, LNCS vol. 7537, pp. 57-76 (2012)

Algebraic Techniques in Differential Cryptanalysis Revisited

Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel

ACISP 2011, LNCS vol. 6812, pp. 120-141 (2011)

Meet-in-the-Middle Attacks on Reduced-Round XTEA

Gautham Sekar, Nicky Mouha, Vesselin Velichkov, Bart Preneel

CT-RSA 2011, LNCS vol. 6558, pp. 250-267 (2011)

The Additive Differential Probability of ARX

Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel

FSE 2011, LNCS vol. 6733, pp. 342-358 (2011)

The Differential Analysis of S-Functions

Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel

SAC 2010, LNCS vol. 6544, pp. 36-56 (2011)

Cryptanalysis of the ESSENCE Family of Hash Functions

Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel

Inscrypt 2009, LNCS vol. 6151, pp. 15–34 (2010)

Finding Collisions for a 45-Step Simplified HAS-V

Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel

WISA 2009, LNCS vol. 5932, pp. 206-225 (2009)

Book Chapters


Nicky Mouha

Encyclopedia of Cryptography and Security (2nd Ed.) pp. 768-771 (2011)


Automated Techniques for Hash Function and Block Cipher Cryptanalysis

Nicky Mouha

Ph.D. thesis, KU Leuven University, 284 pages (2012)

Cryptanalyse van Hashfuncties

Nicky Mouha

Master’s thesis, KU Leuven University, 89 pages (2008)

Thesis Supervision

The Design and Efficient Software Implementation of S-boxes

Markus Ullrich

Master’s thesis, KU Leuven University, 76 pages (2010)

Technical Reports

An overview of the Eight International Olympiad in Cryptography “Non-Stop University CRYPTO”

Anastasiya Gorodilova, Natalia Tokareva, Sergey Agievich, Ilya Beterov, Tim Beyne, Lilya Budaghyan, Claude Carlet, Siemen Dhooghe, Valeria Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Ekaterina Malygina, Nicky Mouha, Marina Pudovkina, Francesco Sica, Aleksei Udovenko

arXiv 2204.11502, 28 pages (2022)

On Properties of Additive Differential Probabilities of XOR

Nicky Mouha, Nikolay Kolomeec, Danil Akhtiamov, Ivan Sutormin, Matvey Panferov, Kseniya Titova, Tatiana Bonich, Evgeniya Ishchukova, Natalia Tokareva, Bulat Zhantulikov

Prikl. Diskr. Mat. Suppl. 2021(14), pp. 46-48 (2021)

The Seventh International Olympiad in Cryptography: Problems and Solutions

Anastasiya Gorodilova, Natalia Tokareva, Sergey Agievich, Claude Carlet, Valeria Idrisova, Konstantin Kalgin, Denis Kolegov, Alexandr Kutsenko, Nicky Mouha, Marina Pudovkina, Aleksei Udovenko

arXiv 2106.01053, 25 pages (2021)

On Proving Security against Differential Cryptanalysis

Nicky Mouha

CFAIL 2019, 21 pages (2019)

Time to Standardize Threshold Schemes for Cryptographic Primitives

Luís Brandão, Michael Davidson, Nicky Mouha, Apostol Vassilev

ITL Bulletin for April 2019, 6 pages (2019)

SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security

Shay Gueron, Nicky Mouha

ePrint 2017/645, 12 pages (2017)

Profiles for the Lightweight Cryptography Standardization Process

Larry Bassham, Çağdaş Çalık, Kerry McKay, Nicky Mouha, Meltem Sönmez Turan

NIST Cybersecurity White Paper, 10 pages (2017)

Chaskey: a MAC Algorithm for Microcontrollers — Status Update and Proposal of Chaskey-12 —

Nicky Mouha

ePrint 2015/1182, 8 pages (2015)

More Rounds, Less Security?

Ritam Bhaumik, Avijit Dutta, Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolić

ePrint 2015/484, 22 pages (2015)

The Design Space of Lightweight Cryptography

Nicky Mouha

NIST Lightweight Cryptography Workshop 2015, 19 pages (2015)

Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20

Nicky Mouha, Bart Preneel

ePrint 2013/328, 29 pages (2013)

Tuple cryptanalysis of ARX with application to BLAKE and Skein

Jean-Philippe Aumasson, Gaëtan Leurent, Willi Meier, Florian Mendel, Nicky Mouha, Raphael C.-W. Phan, Yu Sasaki, Petr Susil

ECRYPT II Hash Workshop 2011, 13 pages (2011)

Security Evaluation of the K2 Stream Cipher

Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, Meiqin Wang

CRYPTREC Technical Report, 46 pages (2011)

Finding Optimal Bitsliced Implementations of 4 x 4-bit S-boxes

Markus Ullrich, Christophe De Cannière, Sebastiaan Indesteege, Özgül Küçük, Nicky Mouha, Bart Preneel

SKEW 2011, 20 pages (2011)