Markku-Juhani O. Saarinen

Orcid: 0000-0002-2555-235X

Affiliations:
  • PQShield Ltd., Oxford, UK


According to our database1, Markku-Juhani O. Saarinen authored at least 61 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Accelerating SLH-DSA by Two Orders of Magnitude with a Single Hash Unit.
IACR Cryptol. ePrint Arch., 2024

Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions.
IACR Cryptol. ePrint Arch., 2024

2023
Mask Compression: High-Order Masking on Memory-Constrained Devices.
IACR Cryptol. ePrint Arch., 2023

High-Order Masking of Lattice Signatures in Quasilinear Time.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

WrapQ: Side-Channel Secure Key Management for Post-quantum Cryptography.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

2022
Development of the RISC-V entropy source interface.
J. Cryptogr. Eng., 2022

Masked Key Wrapping and Mask Compression.
IACR Cryptol. ePrint Arch., 2022

WiP: Applicability of ISO Standard Side-Channel Leakage Tests to NIST Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2022

NIST SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful.
IACR Cryptol. ePrint Arch., 2022

SP 800-22 and GM/T 0005-2012 Tests: Clearly Obsolete, Possibly Harmful.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
The design of scalar AES Instruction Set Extensions for RISC-V.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

On Entropy and Bit Patterns of Ring Oscillator Jitter.
IACR Cryptol. ePrint Arch., 2021

2020
Building a Modern TRNG: An Entropy Source Interface for RISC-V.
IACR Cryptol. ePrint Arch., 2020

A Lightweight ISA Extension for AES and SM4.
CoRR, 2020

Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards.
Proceedings of the 8th IEEE International Conference on Mobile Cloud Computing, 2020

2019
SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions.
IACR Cryptol. ePrint Arch., 2019

Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5.
IACR Cryptol. ePrint Arch., 2019

A chosen key attack against the secret S-boxes of GOST.
IACR Cryptol. ePrint Arch., 2019

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

2018
Arithmetic coding and blinding countermeasures for lattice signatures - Engineering a side-channel resistant post-quantum signature scheme with compact signatures.
J. Cryptogr. Eng., 2018

Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M.
IACR Cryptol. ePrint Arch., 2018

Round5: Compact and Fast Post-Quantum Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2018

2017
On Reliability, Reconciliation, and Error Correction in Ring-LWE Encryption.
IACR Cryptol. ePrint Arch., 2017

HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

2016
The BRUTUS automatic cryptanalytic framework - Testing CAESAR authenticated encryption candidates for weaknesses.
J. Cryptogr. Eng., 2016

Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2016

Arithmetic Coding and Blinding Countermeasures for Ring-LWE.
IACR Cryptol. ePrint Arch., 2016

Secure architectures of future emerging cryptography <i>SAFEcrypto</i>.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC).
RFC, November, 2015

Gaussian Sampling Precision and Information Leakage in Lattice Cryptography.
IACR Cryptol. ePrint Arch., 2015

STRIBOB / WHIRLBOB Security Analysis Addendum.
IACR Cryptol. ePrint Arch., 2015

WHIRLBOB, the Whirlpool Based Variant of STRIBOB.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

2014
BRUTUS: Identifying Cryptanalytic Weaknesses in CAESAR First Round Candidates.
IACR Cryptol. ePrint Arch., 2014

Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor.
IACR Cryptol. ePrint Arch., 2014

Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob.
IACR Cryptol. ePrint Arch., 2014

STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation.
IACR Cryptol. ePrint Arch., 2014

2013
CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions.
IACR Cryptol. ePrint Arch., 2013

Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation.
IACR Cryptol. ePrint Arch., 2013

Related-key Attacks Against Full Hummingbird-2.
IACR Cryptol. ePrint Arch., 2013

2012
A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract).
IACR Cryptol. ePrint Arch., 2012

The BlueJay Ultra-Lightweight Hybrid Cryptosystem.
IACR Cryptol. ePrint Arch., 2012

Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
SGCM: The Sophie Germain Counter Mode.
IACR Cryptol. ePrint Arch., 2011

Cryptographic Analysis of All 4 x 4 - Bit S-Boxes.
IACR Cryptol. ePrint Arch., 2011

GCM, GHASH and Weak Keys.
IACR Cryptol. ePrint Arch., 2011

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm.
IACR Cryptol. ePrint Arch., 2011

Cryptographic Analysis of All 4 × 4-Bit S-Boxes.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Cryptanalysis of Hummingbird-1.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

2010
The PASSERINE Public Key Encryption and Authentication Mechanism.
IACR Cryptol. ePrint Arch., 2010

2007
A Meet-in-the-Middle Collision Attack Against the New FORK-256.
IACR Cryptol. ePrint Arch., 2007

Linearization Attacks Against Syndrome Based Hashes.
IACR Cryptol. ePrint Arch., 2007

2006
Security of VSH in the Real World.
IACR Cryptol. ePrint Arch., 2006

Chosen-IV Statistical Attacks on eStream Ciphers.
Proceedings of the SECRYPT 2006, 2006

2004
Encrypted Watermarks and Linux Laptop Security.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2003
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2001
A Time-Memory Tradeoff Attack Against LILI-128.
IACR Cryptol. ePrint Arch., 2001

Extending the Limits of Collaborative Virtual Environments.
Proceedings of the Collaborative Virtual Environments, 2001

2000
An Architecture for Virtual Reality, Audio, Video, Text & Document Handling in Applications Supporting Multi-Person Interactions.
Proceedings of the 26th EUROMICRO 2000 Conference, 2000

Collaborative virtual environments in the year of the dragon.
Proceedings of the Third International Conference on Collaborative Virtual Environments, 2000

1999
Attacks against the WAP WTLS protocol.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999


  Loading...