Publications by Markku-Juhani O. Saarinen

2009

15Markku-Juhani O. Saarinen. Cryptanalysis of Dedicated Cryptographic Hash Functions. PhD thesis, Information Security Group, Royal Holloway, University of London, 2009.
Info

2008

14Markku-Juhani O. Saarinen. Project TWOVAULT – secure and selectively deniable data storage. In E. Akyildiz and S. Sarirogly, editors, Proc. ISCTURKEY 2008, Dec 25–27, 2008, Ankara, Turkey, pages 42–47. Information Association of Turkey, 2008.
Info

2007

13Markku-Juhani O. Saarinen. A meet-in-the-middle collision attack against the new FORK-256. In K. Srinathan, C. P. Rangan, and M. Yung, editors, Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 913, 2007, Proceedings, volume 4859 of Lecture Notes in Computer Science, pages 10–17. Springer, 2007.
Info
12Markku-Juhani O. Saarinen. Linearization attacks against syndrome based hashes. In K. Srinathan, C. P. Rangan, and M. Yung, editors, Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 913, 2007, Proceedings, volume 4859 of Lecture Notes in Computer Science, pages 1–9. Springer, 2007.
Info

2006

11Markku-Juhani O. Saarinen. Security of VSH in the real world. In K. Srinathan, C. P. Rangan, and M. Yung, editors, Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 1113, 2006, Proceedings, volume 4329 of Lecture Notes in Computer Science, pages 95–103. Springer, 2006.
Info
10Markku-Juhani O. Saarinen. Chosen-IV statistical attacks against eSTREAM ciphers. In M. Malek, E. Fernández-Medina, and J. Hernando, editors, SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7–10, 2006, pages 260–266. INSTICC Press, 2006.
Info
9Markku-Juhani O. Saarinen. d-monomial tests are effective against stream ciphers. In SASC 2006 - Stream Ciphers Revisited, Special Workshop hosted by the ECRYPT Network of Excellence Leuven, Belgium, February 2-3, 2006. ECRYPT, 2006. Workshop Record.
Info
8Kamal Bentahar, Dan Page, Joseph H. Silverman, Nigel P. Smart, and Markku-Juhani O. Saarinen. LASH. In Cryptographic Hash Function Workshop, August 24–25 2006, Santa Barbara, US. NIST, 2006. Workshop record.
Info

2004

7Markku-Juhani O. Saarinen. Encrypted watermarks and linux laptop security. In C. H. Lim and M. Yung, editors, Information Security Applications, 5th International Workshop, WISA2004, Jeju Island, Republic of Korea, August 23–25, 2004, volume 3325 of Lecture Notes in Computer Science, pages 30–41. Springer, 2004.
Info
6Markku-Juhani O. Saarinen. Linux for the information smuggler. In C. Candolin and J. Jormakka, editors, Technical Aspects of Network Centric Warfare, volume 17 of Finnish National Defence College, Department of Technology, pages 228–239, 2004.
Info

2003

5Markku-Juhani O. Saarinen. Cryptanalysis of block ciphers based on SHA1 and MD5. In Joan Daemen and Vincent Rijmen, editors, Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24–26, 2003, Revised Papers, volume 2887 of Lecture Notes in Computer Science, pages 36–44. Springer, 2003.
Info

2002

4Markku-Juhani O. Saarinen. Cryptanalysis of LILI-128. In Joan Daemen and Vincent Rijmen, editors, Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 46, 2002, Revised Papers, volume 2365 of Lecture Notes in Computer Science, pages 231–236. Springer-Verlag, 2002.
Info

2000

3S. Pekkola, M. Robinson, J. Korhonen, S. Hujala, T. Toivonen, and Markku-Juhani O. Saarinen. An architecture for virtual reality, audio, video, text & document handling in applications supporting multi-person interactions. In 26th EUROMICRO 2000 Conference, Informatics: Inventing the Future, 5–7 September 2000, Maastricht, The Netherlands, page 2150 – 2157. IEEE Computer Society 2000, 2000.
Info

1999

2Markku-Juhani O. Saarinen. Attacks against the WAP WTLS protocol. In Bart Preneel, editor, Secure Information Networks: Communications and Multimedia Security, IFIP TC6/TC11 Working Conference on Communications and Multimedia Security (CMS '99), September 2021, 1999, Leuven, Belgium, volume 152 of IFIP, pages 209–215. Kluwer, 1999.
Info
1Markku-Juhani O. Saarinen. A note regarding the hash function use of MARS and RC6. Technical report, SSH Communications Security Ltd., 1999. Official Federal Comment on AES for NIST, 14 April 1999.
Info