Jean-Philippe Aumasson
Jean-Philippe Aumasson
Kudelski Security
Verified email at - Homepage
Cited by
Cited by
SipHash: a fast short-input PRF
JP Aumasson, DJ Bernstein
International Conference on Cryptology in India, 489-508, 2012
BLAKE2: simpler, smaller, fast as MD5
JP Aumasson, S Neves, Z Wilcox-O’Hearn, C Winnerlein
Applied Cryptography and Network Security: 11th International Conference†…, 2013
Sha-3 proposal blake
JP Aumasson, L Henzen, W Meier, RCW Phan
Submission to NIST 92, 194, 2008
Cube testers and key recovery attacks on reduced-round MD6 and Trivium
JP Aumasson, I Dinur, W Meier, A Shamir
International Workshop on Fast Software Encryption, 1-22, 2009
Serious cryptography: a practical introduction to modern encryption
JP Aumasson
No Starch Press, 2017
Quark: A Lightweight Hash
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
International workshop on cryptographic hardware and embedded systems, 1-15, 2010
Quark: A Lightweight Hash
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
Journal of cryptology 26, 313-339, 2013
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne†…, 2008
Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi
JP Aumasson, W Meier
rump session of Cryptographic Hardware and Embedded Systems-CHES 2009, 67, 2009
Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128
JP Aumasson, I Dinur, L Henzen, W Meier, A Shamir
Cryptology ePrint Archive, 2009
The BLAKE2 cryptographic hash and message authentication code (MAC)
MJ Saarinen, JP Aumasson
The hash function BLAKE
JP Aumasson, W Meier, RCW Phan, L Henzen
Springer Berlin Heidelberg 10, 978-3, 2014
Improving stateless hash-based signatures
JP Aumasson, G Endignoux
Cryptographers’ Track at the RSA Conference, 219-242, 2018
Preimage attacks on 3-pass HAVAL and step-reduced MD5
JP Aumasson, W Meier, F Mendel
Selected Areas in Cryptography: 15th International Workshop, SAC 2008†…, 2009
The impact of quantum computing on cryptography
JP Aumasson
Computer Fraud & Security 2017 (6), 8-11, 2017
NORX: parallel and scalable AEAD
JP Aumasson, P Jovanovic, S Neves
Computer Security-ESORICS 2014: 19th European Symposium on Research in†…, 2014
The hash function family LAKE
JP Aumasson, W Meier, RCW Phan
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne†…, 2008
Improved cryptanalysis of Skein
JP Aumasson, « «alık, W Meier, O ÷zen, RCW Phan, K Varıcı
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the†…, 2009
SHA-3 proposal BLAKE (version 1.4)
JP Aumasson
http://csrc. nist. gov/groups/ST/hash/sha-3/Round3/submissions_rnd3. html, 2011
VLSI characterization of the cryptographic hash function BLAKE
L Henzen, JP Aumasson, W Meier, RCW Phan
IEEE transactions on very large scale integration (vlsi) systems 19 (10†…, 2010
The system can't perform the operation now. Try again later.
Articles 1–20