Home
Research
Talks
Events
Favorites
Research papers and projects:
SAFE: Sponge API for field elements
JPA, Dmitry Khovratovich, Bart Mennink, Porçu Quine
Cryptology ePrint archive, report 2023/522
See also the original post .
Security review of Ethereum beacon clients
JPA, Denis Kolegov, Evangelia Stathopoulou
Security of BLS batch verification
JPA, Quan Thoi Minh Nguyen, Antonio Sanso
Ethresearch
A survey of ECDSA threshold signing
JPA, Adrian Hamelink, Omer Shlomovits
Cryptology ePrint archive, report 2020/1390
Attacking threshold wallets
JPA, Omer Shlomovits
Real World Crypto 2021
Cryptology ePrint archive, report 2020/1052
BLAKE3 – one function, fast everywhere
Jack O'Connor, Samuel Neves, JPA, Zooko
Real World Crypto 2020 (lightning talk)
Too much crypto
JPA
Real World Crypto 2020
Improving stateless hash-based signatures
JPA, Guillaume Endignoux
CT-RSA 2018
Cryptology ePrint archive, report 2017/933
Clarifying the subset-resilience problem
JPA, Guillaume Endignoux
Cryptology ePrint archive, report 2017/909
SGX secure enclaves in practice: security and crypto review
Black Hat
Also get the slides , tools , and SGX application .
Backdoors up my sleeve
JPA
International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO) 0x08 , 2015
NORX8 and NORX16: authenticated encryption for low-end systems
JPA, Philipp Jovanovic, Samuel Neves
TRUDEVICE 2015
Analysis of NORX
Philipp Jovanovic, Samuel Neves, JPA
Third International Conference on Cryptology and Information Security
in Latin America (Latincrypt 2014)
Cryptology ePrint archive, report 2014/317
NORX: parallel and scalable AEAD
JPA, Philipp Jovanovic, Samuel Neves
European Symposium on Research in Computer Security (ESORICS) 2014
Malicious hashing: Eve's variant of SHA-1
Ange Albertini, JPA, Maria Eichlseder, Florian Mendel, Martin Schläffer
Selected Areas in Cryptography (SAC) 2014
BSides Las Vegas
DEFCON Skytalks
NORX
JPA, Philipp Jovanovic, Samuel Neves
Candidate to the CAESAR competition,
2014
A binary magic trick, Angecryption
Ange Albertini JPA
International Journal of Proof-of-Concept or Get The Fuck Out
(PoC||GTFO) 0x03
, 2014
BLAKE2: simpler, smaller, fast as MD5
JPA, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
Applied Cryptography and Network Security (ACNS) 2013
Cryptology ePrint archive, report 2013/322
Quark: a lightweight hash (full version)
JPA, Luca Henzen, Willi Meier, María Naya-Plasencia
Journal of Cryptology , 26(2):313,339, 2013
SipHash: a fast short-input PRF
JPA, Daniel J. Bernstein
DIAC -- Directions in Authenticated Ciphers , 2012
13th International Conference on Cryptology in India (INDOCRYPT
2012)
Cryptology ePrint archive, report 2012/351
Heavy Quark for secure AEAD
JPA, Simon Knellwolf, Willi Meier
DIAC -- Directions in Authenticated Ciphers , 2012
Implementing BLAKE with AVX, AVX2, and XOP
Samuel Neves, JPA
Cryptology ePrint archive, report 2012/275
Extended version of the Third SHA-3 Conference paper
BLAKE and 256-bit advanced vector
extensions Samuel Neves, JPA
Third SHA-3 Conference , 2012
Practical attack on 8 rounds of the lightweight block
cipher KLEIN JPA, María Naya-Plasencia, Markku-Juhani
O. Saarinen
12th International Conference on Cryptology in India (INDOCRYPT
2011)
A note on a privacy-preserving
distance bounding protocol JPA, Aikaterini Mitrokotsa, Pedro
Peris-Lopez
Thirteenth International Conference on Information
and Communications Security (ICICS 2011)
On the key schedule strength of PRESENT Julio
Cesar Hernandez-Castro, Pedro Peris-Lopez, JPA4th SETOP
International Workshop on Autonomous and Spontaneous Security (SETOP
2011)
Eve's SHA3 candidate: malicious
hashing JPAECRYPT2 Hash Workshop 2011
Tuple cryptanalysis of ARX
with application to BLAKE and Skein JPA, Gaëtan Leurent, Willi
Meier, Florian Mendel, Nicky Mouha, Raphael C.-W. Phan, Yu Sasaki,
Petr SusilECRYPT2 Hash Workshop 2011
Mind your nonces: cryptanalysis of a
privacy-preserving distance bounding protocol JPA,
Aikaterini Mitrokotsa, Pedro Peris-LopezApplied Cryptography
and Network Security (ACNS) 2011, industrial track
On the cryptanalysis of the hash
function Fugue: partitioning and inside-out
distinguishers JPA, Raphael C.-W. PhanInformation
Processing Letters , 111(11):512-515, 2011
Exponential attacks on 6-round
Luby-Rackoff and on 5-round Lai-Massey JPACryptology
ePrint archive, report 2011/015
Cryptanalysis of splay tree based
encryption JPACryptology ePrint archive, report
2010/572
VLSI characterization of the
cryptographic hash function BLAKE
Luca Henzen, JPA, Willi Meier, Raphael C.-W. Phan
IEEE Transactions on Very Large Scale Integration Systems , 2010
Distinguisher for full final round
of Fugue-256
JPA, Raphael C.-W. Phan
Second SHA-3 Conference , 2010
Quark: a lightweight hash
JPA, Luca Henzen, Willi Meier, María Naya-Plasencia
Cryptographic Hardware and Embedded Systems (CHES) 2010
One of 3 papers from CHES 2010 invited to the Journal of Cryptology
Distinguishers for the compression function and output transformation of Hamsi-256
JPA, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Ødegaard, Thomas Peyrin, Martin Schläffer
15th Australasian Conference on Information Security and
Privacy (ACISP 2010)
Cryptology ePrint archive, report 2010/091
Practical distinguisher for the compression function of Blue Midnight Wish
JPA
Comment on the NIST Hash Competition, 2010
Differential and invertibility
properties of BLAKE
JPA, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
Fast Software Encryption (FSE) 2010
Cryptology ePrint archive, report 2010/043
Cryptanalysis of ESSENCE
María Naya-Plasencia, Andrea Röck, JPA, Yann
Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
Fast Software Encryption (FSE) 2010
Cryptology ePrint archive, report 2009/302
Cryptanalysis of the ESSENCE family of hash functions
Nicky Mouha, Gautham Sekar, JPA, Thomas Peyrin, Søren
S. Thomsen, Meltem Sönmez Turan, Bart Preneel
Inscrypt 2009
Design and analysis of symmetric cryptographic algorithms
JPA PhD thesis, EPFL, 2009
Zero-sum distinguishers for
reduced Keccak-f and for the core functions of Luffa and Hamsi
JPA, Willi Meier
Comment on the NIST Hash Competition, 2009
Awarded the coffee machine prize for the most interesting
cryptanalysis of Keccak by the Keccak Team
Improved cryptanalysis of
Skein JPA, Çağdaş Çalık, Willi Meier, Onur Özen, Raphael
C.-W. Phan, Kerem Varıcı
Asiacrypt 2009
Cryptology ePrint archive, report 2009/438
Efficient FPGA implementations
of high-dimensional cube testers on the stream cipher Grain-128
JPA, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
SHARCS 2009
Cryptology ePrint archive, report 2009/218
Cryptanalysis of Dynamic SHA(2)
JPA, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
Selected Areas in Cryptography (SAC) 2009
Cryptology ePrint archive, report 2009/184
Cryptanalysis of the MCSSHA hash functions
JPA, María Naya-Plasencia
WEWoRC 2009
First analysis of Keccak
JPA, Dmitry Khovratovich
Comment on
the NIST Hash
Competition, 2009
Awarded the 25-beer prize for the best cryptanalysis
of Keccak by the Keccak Team
Security and privacy preservation in human-involved
networks
Craig Asher, JPA, Raphael C.-W. Phan
iNetSec 2009
More on
Shabal's permutation
JPA, Atefeh Mashatan, Willi Meier
Comment on
the NIST Hash
Competition, 2009
Inside the hypercube
JPA, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
14th Australasian Conference on Information Security and
Privacy (ACISP 2009)
Cryptology ePrint archive, report 2008/486
Awarded the €100 prize for the most interesting cryptanalysis
of CubeHash by Daniel J. Bernstein
Cryptanalysis of Vortex
JPA, Orr Dunkelman, Florian Mendel, Christian Rechberger,
Søren S. Thomsen Africacrypt 2009
Cube testers and key recovery
attacks on reduced-round MD6 and Trivium
JPA, Itai Dinur, Willi Meier, Adi Shamir
Fast Software Encryption (FSE) 2009
Also appeared in Schloss Dagstuhl seminar proceedings
Cryptanalysis of the ISDB scrambling algorithm (MULTI2)
JPA, Jorge Nakahara Jr., Pouyan Sepehrdad
Fast Software Encryption (FSE) 2009
On the pseudorandomness of
Shabal's keyed permutation
JPA
Comment on
the NIST Hash
Competition, 2009
VLSI implementations of the cryptographic hash
functions MD6 and ïrRUPT
Luca Henzen, Flavio Carbognani, JPA, Sean O'Neil, Wolfgang Fichtner
IEEE ISCAS 2009
On hashing with tweakable ciphers
Raphael C.-W. Phan, JPA
IEEE ICC 2009
Cryptanalysis of a hash function
based on norm form equations
JPA
Cryptologia , 33(1):1-4, 2009
A note on Vortex' security
JPA, Orr Dunkelman
Comment on
the NIST Hash
Competition, 2008
Second preimages on MCSSHA-3
JPA, María Naya-Plasencia
Comment on
the NIST Hash
Competition, 2008
SHA-3 proposal BLAKE
JPA, Luca Henzen, Willi Meier, Raphael C.-W. Phan
Candidate to the NIST Hash Competition,
2008
Faster multicollisions
JPA
9th International Conference on Cryptology in India (INDOCRYPT
2008)
Previously accepted to SECRYPT 2008 , but withdrawn because unable to
attend the conference
Preimage attacks on 3-pass HAVAL and step-reduced MD5
JPA, Willi Meier, Florian Mendel
Selected Areas in Cryptography (SAC) 2008
Cryptology ePrint archive, report 2008/183
How (not) to efficiently dither
blockcipher-based hash functions?
JPA, Raphael C.-W. Phan
Africacrypt 2008
Next generation networks:
human-aided and privacy-driven
Raphael C.-W. Phan, JPA
ITU-T "Innovations in NGN" Kaleidoscope Conference , 2008
The hash function family LAKE
JPA, Willi Meier, Raphael C.-W. Phan
Fast Software Encryption (FSE) 2008
New features of Latin dances:
analysis of Salsa, Chacha, and Rumba
JPA, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger.
Fast Software Encryption (FSE) 2008
Cryptology ePrint archive, report 2007/472
Awarded the $1000 prize for the most interesting cryptanalysis of
Rumba20 by Daniel J. Bernstein
Analysis of multivariate hash
functions JPA, Willi Meier 10th International
Conference on Information Security and Cryptology (ICISC 2007)
TCHo: a hardware-oriented trapdoor
cipher JPA, Matthieu Finiasz, Willi Meier, Serge
Vaudenay. 12th Australasian Conference on Information Security and
Privacy (ACISP 2007)
Adaptive learning search, a new
tool to help comprehending metaheuristics
Johann Dréo, JPA, Patrick Siarry, Walid
Tfaili. International Journal on Artificial Intelligence
Tools , 16(3):483-505, 2007
On a
bias of Rabbit JPAThe
State of the Art of Stream Ciphers (SASC 2007) Awarded the $1000 prize for
the best analysis of Rabbit by Cryptico
On the pseudo-random generator
ISAAC JPACryptology ePrint archive, report 2006/438
A novel asymmetric scheme with
stream cipher construction JPA Master's thesis, EPFL,
Université Paris VII, 2006
Conception d'un module de test de
métaheuristiques JPA Undergraduate thesis, Université Paris
XII, Université Cergy-Pontoise, 2005