Follow
Markku-Juhani Saarinen
Markku-Juhani Saarinen
PQShield Ltd.
Verified email at pqshield.com - Homepage
Title
Cited by
Cited by
Year
The Hummingbird-2 lightweight authenticated encryption algorithm
D Engels, MJO Saarinen, P Schweitzer, EM Smith
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
2282012
Cryptographic analysis of all 4× 4-bit S-boxes
MJO Saarinen
Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012
1392012
Arithmetic coding and blinding countermeasures for lattice signatures
MJO Saarinen
Journal of Cryptographic Engineering, 1-14, 2017
90*2017
Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes.
MJO Saarinen
FSE 7549, 216-225, 2012
902012
Method and apparatus for improved pseudo-random number generation
MJ Saarinen
US Patent 7,007,050, 2006
792006
Chosen-IV Statistical Attacks on eStream Ciphers.
MJO Saarinen
SECRYPT, 260-266, 2006
77*2006
Cryptanalysis of block tea
MJ Saarinen
Unpublished manuscript, October, 1998
751998
Round5: Compact and fast post-quantum public-key encryption
H Baan, S Bhattacharya, S Fluhrer, O Garcia-Morchon, T Laarhoven, ...
Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019
71*2019
The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)
MJO Saarinen, JP Aumasson
https://tools.ietf.org/html/rfc7693, 2015
692015
A time-memory tradeoff attack against LILI-128
MJO Saarinen
Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven …, 2002
672002
Attacks against the WAP WTLS protocol
MJO Saarinen
Secure Information Networks, 209-215, 1999
631999
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
MJO Saarinen
SAC 2017, To appear, 2017
582017
Cryptanalysis of hummingbird-1
MJO Saarinen
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
532011
A chosen key attack against the secret S-boxes of GOST
MJO Saarinen
Unpublished manuscript. Available as IACR ePrint https://eprint.iacr.org …, 1998
48*1998
Cryptanalysis of block ciphers based on SHA-1 and MD5
MJO Saarinen
Fast Software Encryption: 10th International Workshop, FSE 2003, Lund …, 2003
442003
A do-it-all-cipher for rfid: Design requirements
MJO Saarinen, D Engels
Cryptology ePrint Archive, 2012
432012
Round5
O Garcia-Morchon, Z Zhang, S Bhattacharya, R Rietman, L Tolhuizen, ...
Technical report, National Institute of Standards and Technology, 2019 …, 2017
40*2017
Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN.
JP Aumasson, M Naya-Plasencia, MJO Saarinen
INDOCRYPT 7107, 134-145, 2011
392011
Beyond modes: Building a secure record protocol from a cryptographic sponge permutation
MJO Saarinen
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
362014
Linearization attacks against syndrome based hashes
MJO Saarinen
Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on …, 2007
362007
The system can't perform the operation now. Try again later.
Articles 1–20