The Hummingbird-2 lightweight authenticated encryption algorithm D Engels, MJO Saarinen, P Schweitzer, EM Smith RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 228 | 2012 |
Cryptographic analysis of all 4× 4-bit S-boxes MJO Saarinen Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012 | 139 | 2012 |
Arithmetic coding and blinding countermeasures for lattice signatures MJO Saarinen Journal of Cryptographic Engineering, 1-14, 2017 | 90* | 2017 |
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes. MJO Saarinen FSE 7549, 216-225, 2012 | 90 | 2012 |
Method and apparatus for improved pseudo-random number generation MJ Saarinen US Patent 7,007,050, 2006 | 79 | 2006 |
Chosen-IV Statistical Attacks on eStream Ciphers. MJO Saarinen SECRYPT, 260-266, 2006 | 77* | 2006 |
Cryptanalysis of block tea MJ Saarinen Unpublished manuscript, October, 1998 | 75 | 1998 |
Round5: Compact and fast post-quantum public-key encryption H Baan, S Bhattacharya, S Fluhrer, O Garcia-Morchon, T Laarhoven, ... Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019 | 71* | 2019 |
The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC) MJO Saarinen, JP Aumasson https://tools.ietf.org/html/rfc7693, 2015 | 69 | 2015 |
A time-memory tradeoff attack against LILI-128 MJO Saarinen Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven …, 2002 | 67 | 2002 |
Attacks against the WAP WTLS protocol MJO Saarinen Secure Information Networks, 209-215, 1999 | 63 | 1999 |
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption MJO Saarinen SAC 2017, To appear, 2017 | 58 | 2017 |
Cryptanalysis of hummingbird-1 MJO Saarinen Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011 | 53 | 2011 |
A chosen key attack against the secret S-boxes of GOST MJO Saarinen Unpublished manuscript. Available as IACR ePrint https://eprint.iacr.org …, 1998 | 48* | 1998 |
Cryptanalysis of block ciphers based on SHA-1 and MD5 MJO Saarinen Fast Software Encryption: 10th International Workshop, FSE 2003, Lund …, 2003 | 44 | 2003 |
A do-it-all-cipher for rfid: Design requirements MJO Saarinen, D Engels Cryptology ePrint Archive, 2012 | 43 | 2012 |
Round5 O Garcia-Morchon, Z Zhang, S Bhattacharya, R Rietman, L Tolhuizen, ... Technical report, National Institute of Standards and Technology, 2019 …, 2017 | 40* | 2017 |
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN. JP Aumasson, M Naya-Plasencia, MJO Saarinen INDOCRYPT 7107, 134-145, 2011 | 39 | 2011 |
Beyond modes: Building a secure record protocol from a cryptographic sponge permutation MJO Saarinen Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014 | 36 | 2014 |
Linearization attacks against syndrome based hashes MJO Saarinen Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on …, 2007 | 36 | 2007 |