Seguir
Markku-Juhani Saarinen
Markku-Juhani Saarinen
Tampere University
Dirección de correo verificada de tuni.fi - Página principal
Título
Citado por
Citado por
Año
The Hummingbird-2 lightweight authenticated encryption algorithm
D Engels, MJO Saarinen, P Schweitzer, EM Smith
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
2542012
Cryptographic analysis of all 4× 4-bit S-boxes
MJO Saarinen
Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012
1572012
The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)
MJO Saarinen, JP Aumasson
https://tools.ietf.org/html/rfc7693, 2015
1052015
Arithmetic coding and blinding countermeasures for lattice signatures
MJO Saarinen
Journal of Cryptographic Engineering, 1-14, 2017
101*2017
Cycling attacks on GCM, GHASH and other polynomial MACs and hashes
MJO Saarinen
International Workshop on Fast Software Encryption, 216-225, 2012
1002012
Round5: Compact and fast post-quantum public-key encryption
H Baan, S Bhattacharya, S Fluhrer, O Garcia-Morchon, T Laarhoven, ...
Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019
88*2019
Method and apparatus for improved pseudo-random number generation
MJ Saarinen
US Patent 7,007,050, 2006
802006
Chosen-IV Statistical Attacks on eStream Ciphers.
MJO Saarinen
SECRYPT, 260-266, 2006
78*2006
Cryptanalysis of block tea
MJ Saarinen
Unpublished manuscript, October, 1998
701998
Attacks against the WAP WTLS protocol
MJO Saarinen
Secure Information Networks, 209-215, 1999
681999
HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption
MJO Saarinen
SAC 2017, To appear, 2017
672017
A time-memory tradeoff attack against LILI-128
MJO Saarinen
Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven …, 2002
672002
The design of scalar AES instruction set extensions for RISC-V
B Marshall, GR Newell, D Page, MJO Saarinen, C Wolf
IACR Transactions on Cryptographic Hardware and Embedded System 2021 (1 …, 2020
632020
Cryptanalysis of hummingbird-1
MJO Saarinen
Fast Software Encryption: 18th International Workshop, FSE 2011, Lyngby …, 2011
552011
A chosen key attack against the secret S-boxes of GOST
MJO Saarinen
Unpublished manuscript. Available as IACR ePrint https://eprint.iacr.org …, 1998
49*1998
Cryptanalysis of block ciphers based on SHA-1 and MD5
MJO Saarinen
International workshop on fast software encryption, 36-44, 2003
462003
Round5
O Garcia-Morchon, Z Zhang, S Bhattacharya, R Rietman, L Tolhuizen, ...
Round 2 submission to the NIST PQC Project, 2019
45*2019
A do-it-all-cipher for rfid: Design requirements
MJO Saarinen, D Engels
Cryptology ePrint Archive, 2012
422012
Linearization attacks against syndrome based hashes
MJO Saarinen
Progress in Cryptology–INDOCRYPT 2007: 8th International Conference on …, 2007
422007
Mobile energy requirements of the upcoming NIST post-quantum cryptography standards
MJO Saarinen
2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020
392020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20