Suivre
Jean-Philippe Aumasson
Jean-Philippe Aumasson
Kudelski Security
Adresse e-mail validée de kudelskisecurity.com - Page d'accueil
Titre
Citée par
Citée par
Année
SipHash: a fast short-input PRF
JP Aumasson, DJ Bernstein
International Conference on Cryptology in India, 489-508, 2012
4202012
BLAKE2: simpler, smaller, fast as MD5
JP Aumasson, S Neves, Z Wilcox-O’Hearn, C Winnerlein
Applied Cryptography and Network Security: 11th International Conference …, 2013
3612013
Sha-3 proposal blake
JP Aumasson, L Henzen, W Meier, RCW Phan
Submission to NIST 92, 1-79, 2008
3572008
Cube testers and key recovery attacks on reduced-round MD6 and Trivium
JP Aumasson, I Dinur, W Meier, A Shamir
International Workshop on Fast Software Encryption, 1-22, 2009
2762009
Quark: A Lightweight Hash
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
International Workshop on Cryptographic Hardware and Embedded Systems, 1-15, 2010
2452010
Quark: A Lightweight Hash
JP Aumasson, L Henzen, W Meier, M Naya-Plasencia
Journal of cryptology 26, 313-339, 2013
2212013
Serious cryptography: a practical introduction to modern encryption
JP Aumasson
No Starch Press, 2017
2092017
New features of Latin dances: analysis of Salsa, ChaCha, and Rumba
JP Aumasson, S Fischer, S Khazaei, W Meier, C Rechberger
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
1792008
Zero-sum distinguishers for reduced Keccak-f and for the core functions of Luffa and Hamsi
JP Aumasson, W Meier
rump session of Cryptographic Hardware and Embedded Systems-CHES 2009, 67, 2009
1332009
Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128
JP Aumasson, I Dinur, L Henzen, W Meier, A Shamir
Cryptology ePrint Archive, 2009
1032009
The BLAKE2 cryptographic hash and message authentication code (MAC)
MJ Saarinen, JP Aumasson
752015
The hash function BLAKE
JP Aumasson, W Meier, RCW Phan, L Henzen
Springer Berlin Heidelberg 10, 978-3, 2014
732014
Preimage attacks on 3-pass HAVAL and step-reduced MD5
JP Aumasson, W Meier, F Mendel
Selected Areas in Cryptography: 15th International Workshop, SAC 2008 …, 2009
622009
NORX: parallel and scalable AEAD
JP Aumasson, P Jovanovic, S Neves
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
612014
Improving stateless hash-based signatures
JP Aumasson, G Endignoux
Cryptographers’ Track at the RSA Conference, 219-242, 2018
572018
Improved cryptanalysis of Skein
JP Aumasson, Ç Çalık, W Meier, O Özen, RCW Phan, K Varıcı
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
522009
The hash function family LAKE
JP Aumasson, W Meier, RCW Phan
Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008
522008
VLSI characterization of the cryptographic hash function BLAKE
L Henzen, JP Aumasson, W Meier, RCW Phan
IEEE transactions on very large scale integration (vlsi) systems 19 (10 …, 2010
472010
The impact of quantum computing on cryptography
JP Aumasson
Computer Fraud & Security 2017 (6), 8-11, 2017
442017
SGX secure enclaves in practice
JP Aumasson, L Merino
Blackhat, 2016
422016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20