Markku-Juhani O. Saarinen

From MaRDI portal
Person:1746966



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Accelerating SLH-DSA by two orders of magnitude with a single hash unit2024-12-04Paper
Threshold raccoon: practical threshold signatures from standard lattice assumptions2024-11-12Paper
Mask compression: high-order masking on memory-constrained devices2024-10-16Paper
WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography2024-04-26Paper
StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012
Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
2021-09-20Paper
Round5: compact and fast post-quantum public-key encryption2020-02-25Paper
HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption2018-04-26Paper
Related-key attacks against full Hummingbird-2
Fast Software Encryption
2015-09-18Paper
CBEAM: efficient authenticated encryption from feebly one-way \(\varphi \) functions
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Cycling attacks on GCM, GHASH and other polynomial MACs and hashes
Fast Software Encryption
2013-01-08Paper
The Hummingbird-2 lightweight authenticated encryption algorithm
RFID. Security and Privacy
2012-08-20Paper
Cryptographic analysis of all \(4 \times 4\)-bit s-boxes
Selected Areas in Cryptography
2012-06-08Paper
Practical attack on 8 rounds of the lightweight block cipher KLEIN
Lecture Notes in Computer Science
2011-12-16Paper
Cryptanalysis of Hummingbird-1
Fast Software Encryption
2011-07-07Paper
Cryptanalysis of block ciphers based on SHA-1 and MD5.
Lecture Notes in Computer Science
2010-01-05Paper
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Lecture Notes in Computer Science
2008-04-11Paper
Linearization Attacks Against Syndrome Based Hashes
Lecture Notes in Computer Science
2008-04-11Paper
Security of VSH in the Real World
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
scientific article; zbMATH DE number 2089140 (Why is no real title available?)2004-08-12Paper


Research outcomes over time


This page was built for person: Markku-Juhani O. Saarinen