Jean-Philippe Aumasson

From MaRDI portal
Person:483131



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Crypto dictionary. 500 tasty tidbits for the curious cryptographer2021-11-26Paper
Improving stateless hash-based signatures2020-01-21Paper
Serious cryptography. A practical introduction to modern encryption. With a foreword by Matthew D. Green2019-08-02Paper
Malicious hashing: Eve's variant of SHA-1
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Analysis of NORX: investigating differential and rotational properties
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
NORX: Parallel and scalable AEAD
Computer Security - ESORICS 2014
2015-07-27Paper
The hash function \texttt{BLAKE}
Information Security and Cryptography
2014-12-15Paper
SipHash: a fast short-input PRF
Lecture Notes in Computer Science
2014-08-20Paper
BLAKE2: simpler, smaller, fast as MD5
Applied Cryptography and Network Security
2014-01-24Paper
Quark: a lightweight hash
Journal of Cryptology
2013-06-27Paper
On the cryptanalysis of the hash function Fugue: partitioning and inside-out distinguishers
Information Processing Letters
2013-03-28Paper
Practical attack on 8 rounds of the lightweight block cipher KLEIN
Lecture Notes in Computer Science
2011-12-16Paper
Cryptanalysis of the ESSENCE family of hash functions
Information Security and Cryptology
2010-11-23Paper
Distinguishers for the compression function and output transformation of Hamsi-256
Information Security and Privacy
2010-10-25Paper
Quark: a lightweight hash
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
Differential and invertibility properties of BLAKE
Fast Software Encryption
2010-07-13Paper
Cryptanalysis of ESSENCE
Fast Software Encryption
2010-07-13Paper
Improved cryptanalysis of Skein
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Cryptanalysis of dynamic SHA(2)
Selected Areas in Cryptography
2009-12-09Paper
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
Selected Areas in Cryptography
2009-11-03Paper
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Fast Software Encryption
2009-08-11Paper
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
Fast Software Encryption
2009-08-11Paper
Cryptanalysis of Vortex
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Inside the Hypercube
Information Security and Privacy
2009-06-25Paper
Cryptanalysis of a Hash Function Based on Norm Form Equations
Cryptologia
2009-05-22Paper
$\mathcal{TCH}o$ : A Hardware-Oriented Trapdoor Cipher
Information Security and Privacy
2009-03-06Paper
Faster Multicollisions
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
Fast Software Encryption
2008-09-18Paper
The Hash Function Family LAKE
Fast Software Encryption
2008-09-18Paper
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Analysis of Multivariate Hash Functions
Lecture Notes in Computer Science
2008-05-06Paper


Research outcomes over time


This page was built for person: Jean-Philippe Aumasson