Research
-
SAFE: Sponge API for field elements
JPA, Dmitry Khovratovich, Bart Mennink, Porçu Quine
Cryptology ePrint archive, report 2023/522
See also the original post. -
Security review of Ethereum beacon clients
JPA, Denis Kolegov, Evangelia Stathopoulou -
Security of BLS batch verification
JPA, Quan Thoi Minh Nguyen, Antonio Sanso
Ethresearch -
A survey of ECDSA threshold signing
JPA, Adrian Hamelink, Omer Shlomovits
Cryptology ePrint archive, report 2020/1390 -
Attacking threshold wallets
JPA, Omer Shlomovits
Real World Crypto 2021
Cryptology ePrint archive, report 2020/1052 -
BLAKE3 – one function, fast everywhere
Jack O'Connor, Samuel Neves, JPA, Zooko
Real World Crypto 2020 (lightning talk) -
Too much crypto
JPA
Real World Crypto 2020 -
Improving stateless hash-based signatures
JPA, Guillaume Endignoux
CT-RSA 2018
Cryptology ePrint archive, report 2017/933 -
Clarifying the subset-resilience problem
JPA, Guillaume Endignoux
Cryptology ePrint archive, report 2017/909 -
SGX secure enclaves in practice: security and crypto review
Black Hat
Also get the slides, tools, and SGX application. -
Backdoors up my sleeve
JPA
International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO) 0x08, 2015 -
NORX8 and NORX16: authenticated encryption for low-end systems
JPA, Philipp Jovanovic, Samuel Neves
TRUDEVICE 2015 -
Analysis of NORX
Philipp Jovanovic, Samuel Neves, JPA
Third International Conference on Cryptology and Information Security in Latin America (Latincrypt 2014)
Cryptology ePrint archive, report 2014/317 -
NORX: parallel and scalable AEAD
JPA, Philipp Jovanovic, Samuel Neves
European Symposium on Research in Computer Security (ESORICS) 2014 -
Malicious hashing: Eve's variant of SHA-1
Ange Albertini, JPA, Maria Eichlseder, Florian Mendel, Martin Schläffer
Selected Areas in Cryptography (SAC) 2014
BSides Las Vegas
DEFCON Skytalks - NORX
JPA, Philipp Jovanovic, Samuel Neves
Candidate to the CAESAR competition, 2014 -
A binary magic trick, Angecryption
Ange Albertini JPA
International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO) 0x03 , 2014 -
BLAKE2: simpler, smaller, fast as MD5
JPA, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein
Applied Cryptography and Network Security (ACNS) 2013
Cryptology ePrint archive, report 2013/322 -
Quark: a lightweight hash (full version)
JPA, Luca Henzen, Willi Meier, María Naya-Plasencia
Journal of Cryptology, 26(2):313,339, 2013 -
SipHash: a fast short-input PRF
JPA, Daniel J. Bernstein
DIAC -- Directions in Authenticated Ciphers, 2012
13th International Conference on Cryptology in India (INDOCRYPT 2012)
Cryptology ePrint archive, report 2012/351 -
Heavy Quark for secure AEAD
JPA, Simon Knellwolf, Willi Meier
DIAC -- Directions in Authenticated Ciphers, 2012 -
Implementing BLAKE with AVX, AVX2, and XOP
Samuel Neves, JPA
Cryptology ePrint archive, report 2012/275
Extended version of the Third SHA-3 Conference paper - BLAKE and 256-bit advanced vector
extensions
Samuel Neves, JPA
Third SHA-3 Conference, 2012 - Practical attack on 8 rounds of the lightweight block
cipher KLEIN
JPA, María Naya-Plasencia, Markku-Juhani O. Saarinen
12th International Conference on Cryptology in India (INDOCRYPT 2011) - A note on a privacy-preserving
distance bounding protocol
JPA, Aikaterini Mitrokotsa, Pedro Peris-Lopez
Thirteenth International Conference on Information and Communications Security (ICICS 2011) - On the key schedule strength of PRESENT
Julio Cesar Hernandez-Castro, Pedro Peris-Lopez, JPA
4th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2011) - Eve's SHA3 candidate: malicious
hashing
JPA
ECRYPT2 Hash Workshop 2011 - Tuple cryptanalysis of ARX
with application to BLAKE and Skein
JPA, Gaëtan Leurent, Willi Meier, Florian Mendel, Nicky Mouha, Raphael C.-W. Phan, Yu Sasaki, Petr Susil
ECRYPT2 Hash Workshop 2011 - Mind your nonces: cryptanalysis of a
privacy-preserving distance bounding protocol
JPA, Aikaterini Mitrokotsa, Pedro Peris-Lopez
Applied Cryptography and Network Security (ACNS) 2011, industrial track - On the cryptanalysis of the hash
function Fugue: partitioning and inside-out
distinguishers
JPA, Raphael C.-W. Phan
Information Processing Letters, 111(11):512-515, 2011 - Exponential attacks on 6-round
Luby-Rackoff and on 5-round Lai-Massey
JPA
Cryptology ePrint archive, report 2011/015 - Cryptanalysis of splay tree based
encryption
JPA
Cryptology ePrint archive, report 2010/572 - VLSI characterization of the
cryptographic hash function BLAKE
Luca Henzen, JPA, Willi Meier, Raphael C.-W. Phan
IEEE Transactions on Very Large Scale Integration Systems, 2010 - Distinguisher for full final round
of Fugue-256
JPA, Raphael C.-W. Phan
Second SHA-3 Conference, 2010 - Quark: a lightweight hash
JPA, Luca Henzen, Willi Meier, María Naya-Plasencia
Cryptographic Hardware and Embedded Systems (CHES) 2010
One of 3 papers from CHES 2010 invited to the Journal of Cryptology - Distinguishers for the compression function and output transformation of Hamsi-256
JPA, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Ødegaard, Thomas Peyrin, Martin Schläffer
15th Australasian Conference on Information Security and Privacy (ACISP 2010)
Cryptology ePrint archive, report 2010/091 - Practical distinguisher for the compression function of Blue Midnight Wish
JPA
Comment on the NIST Hash Competition, 2010 - Differential and invertibility
properties of BLAKE
JPA, Jian Guo, Simon Knellwolf, Krystian Matusiewicz, Willi Meier
Fast Software Encryption (FSE) 2010
Cryptology ePrint archive, report 2010/043 - Cryptanalysis of ESSENCE
María Naya-Plasencia, Andrea Röck, JPA, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin
Fast Software Encryption (FSE) 2010
Cryptology ePrint archive, report 2009/302 - Cryptanalysis of the ESSENCE family of hash functions
Nicky Mouha, Gautham Sekar, JPA, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel
Inscrypt 2009 - Design and analysis of symmetric cryptographic algorithms
JPA
PhD thesis, EPFL, 2009 - Zero-sum distinguishers for
reduced Keccak-f and for the core functions of Luffa and Hamsi
JPA, Willi Meier
Comment on the NIST Hash Competition, 2009
Awarded the coffee machine prize for the most interesting cryptanalysis of Keccak by the Keccak Team - Improved cryptanalysis of
Skein
JPA, Çağdaş Çalık, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varıcı
Asiacrypt 2009
Cryptology ePrint archive, report 2009/438 - Efficient FPGA implementations
of high-dimensional cube testers on the stream cipher Grain-128
JPA, Itai Dinur, Luca Henzen, Willi Meier, Adi Shamir
SHARCS 2009
Cryptology ePrint archive, report 2009/218 - Cryptanalysis of Dynamic SHA(2)
JPA, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel
Selected Areas in Cryptography (SAC) 2009
Cryptology ePrint archive, report 2009/184 - Cryptanalysis of the MCSSHA hash functions
JPA, María Naya-Plasencia
WEWoRC 2009 - First analysis of Keccak
JPA, Dmitry Khovratovich
Comment on the NIST Hash Competition, 2009
Awarded the 25-beer prize for the best cryptanalysis of Keccak by the Keccak Team - Security and privacy preservation in human-involved
networks
Craig Asher, JPA, Raphael C.-W. Phan
iNetSec 2009 - More on
Shabal's permutation
JPA, Atefeh Mashatan, Willi Meier
Comment on the NIST Hash Competition, 2009 - Inside the hypercube
JPA, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
14th Australasian Conference on Information Security and Privacy (ACISP 2009)
Cryptology ePrint archive, report 2008/486
Awarded the €100 prize for the most interesting cryptanalysis of CubeHash by Daniel J. Bernstein - Cryptanalysis of Vortex
JPA, Orr Dunkelman, Florian Mendel, Christian Rechberger, Søren S. Thomsen
Africacrypt 2009 - Cube testers and key recovery
attacks on reduced-round MD6 and Trivium
JPA, Itai Dinur, Willi Meier, Adi Shamir
Fast Software Encryption (FSE) 2009
Also appeared in Schloss Dagstuhl seminar proceedings - Cryptanalysis of the ISDB scrambling algorithm (MULTI2)
JPA, Jorge Nakahara Jr., Pouyan Sepehrdad
Fast Software Encryption (FSE) 2009 - On the pseudorandomness of
Shabal's keyed permutation
JPA
Comment on the NIST Hash Competition, 2009 - VLSI implementations of the cryptographic hash
functions MD6 and ïrRUPT
Luca Henzen, Flavio Carbognani, JPA, Sean O'Neil, Wolfgang Fichtner
IEEE ISCAS 2009 - On hashing with tweakable ciphers
Raphael C.-W. Phan, JPA
IEEE ICC 2009 - Cryptanalysis of a hash function
based on norm form equations
JPA
Cryptologia, 33(1):1-4, 2009 - A note on Vortex' security
JPA, Orr Dunkelman
Comment on the NIST Hash Competition, 2008 - Second preimages on MCSSHA-3
JPA, María Naya-Plasencia
Comment on the NIST Hash Competition, 2008 - SHA-3 proposal BLAKE
JPA, Luca Henzen, Willi Meier, Raphael C.-W. Phan
Candidate to the NIST Hash Competition, 2008 - Faster multicollisions
JPA
9th International Conference on Cryptology in India (INDOCRYPT 2008)
Previously accepted to SECRYPT 2008, but withdrawn because unable to attend the conference - Preimage attacks on 3-pass HAVAL and step-reduced MD5
JPA, Willi Meier, Florian Mendel
Selected Areas in Cryptography (SAC) 2008
Cryptology ePrint archive, report 2008/183 - How (not) to efficiently dither
blockcipher-based hash functions?
JPA, Raphael C.-W. Phan
Africacrypt 2008 - Next generation networks:
human-aided and privacy-driven
Raphael C.-W. Phan, JPA
ITU-T "Innovations in NGN" Kaleidoscope Conference, 2008 - The hash function family LAKE
JPA, Willi Meier, Raphael C.-W. Phan
Fast Software Encryption (FSE) 2008 - New features of Latin dances:
analysis of Salsa, Chacha, and Rumba
JPA, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger.
Fast Software Encryption (FSE) 2008
Cryptology ePrint archive, report 2007/472
Awarded the $1000 prize for the most interesting cryptanalysis of Rumba20 by Daniel J. Bernstein - Analysis of multivariate hash
functions
JPA, Willi Meier
10th International Conference on Information Security and Cryptology (ICISC 2007) - TCHo: a hardware-oriented trapdoor
cipher
JPA, Matthieu Finiasz, Willi Meier, Serge Vaudenay.
12th Australasian Conference on Information Security and Privacy (ACISP 2007) - Adaptive learning search, a new
tool to help comprehending metaheuristics
Johann Dréo, JPA, Patrick Siarry, Walid Tfaili.
International Journal on Artificial Intelligence Tools, 16(3):483-505, 2007 - On a
bias of Rabbit
JPA
The State of the Art of Stream Ciphers (SASC 2007)
Awarded the $1000 prize for the best analysis of Rabbit by Cryptico - On the pseudo-random generator
ISAAC
JPA
Cryptology ePrint archive, report 2006/438 - A novel asymmetric scheme with
stream cipher construction
JPA
Master's thesis, EPFL, Université Paris VII, 2006 - Conception d'un module de test de
métaheuristiques
JPA
Undergraduate thesis, Université Paris XII, Université Cergy-Pontoise, 2005