• Publications
  • Influence
BLAKE2: Simpler, Smaller, Fast as MD5
TLDR
We present the hash function BLAKE2, an improved version of the SHA-3 finalist BL aKE optimized for speed in software. Expand
  • 184
  • 42
  • PDF
NORX: Parallel and Scalable AEAD
TLDR
This paper introduces NORX, a novel authenticated encryption scheme supporting arbitrary parallelism degree and based on ARX primitives. Expand
  • 44
  • 8
  • PDF
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
TLDR
We introduce the tweakable Even-Mansour construction $$\mathsf {MEM}$$MEM is a secure tweakable blockcipher upi¾?to the birthday bound. Expand
  • 58
  • 7
  • PDF
Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory
At CRYPTO 2016, Cogliati and Seurin introduced the Encrypted Davies-Meyer construction, \(p_2(p_1(x) \oplus x)\) for two n-bit permutations \(p_1,p_2\), and proved security up to \(2^{2n/3}\). WeExpand
  • 40
  • 4
  • PDF
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
TLDR
This paper presents NORX8 and NORX16, the 8-bit and 16-bit versions of the authenticated cipher NORX, one of the CAESAR candidates. Expand
  • 17
  • 3
  • PDF
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
TLDR
We investigate another flawed authenticated encryption scheme, which is deployed in the Open Smart Grid Protocol (OSGP). Expand
  • 25
  • 2
  • PDF
On the performance of GPU public-key cryptography
  • Samuel Neves, F. Araújo
  • Computer Science, Chemistry
  • ASAP - 22nd IEEE International Conference on…
  • 11 September 2011
TLDR
Graphics processing units (GPUs) have become increasingly popular over the last years as a cost-effective means of accelerating various computationally intensive tasks. Expand
  • 23
  • 2
  • PDF
Analysis of NORX: Investigating Differential and Rotational Properties
TLDR
This paper presents a thorough analysis of the AEAD scheme NORX, focussing on differential and rotational properties of the core permutation. Expand
  • 26
  • 2
  • PDF
Optimal PRFs from Blockcipher Designs
TLDR
Cryptographic modes built on top of a blockcipher usually rely on the assumption that this primitive behaves like a pseudorandom permutation. Expand
  • 11
  • 1
  • PDF
Implementing BLAKE with AVX, AVX2, and XOP
TLDR
We investigate the potential of AVX2 to speed-up the SHA-3 finalist BLAKE, and report new speed records on Sandy Bridge and Bulldozer microarchitectures (7.47 and 11.95 cycles per byte). Expand
  • 7
  • 1
  • PDF