# MJOS.FI Here's a recent [**CV**](https://mjos.fi/doc/saarinen_cv.pdf) with a clickable list of publications. Regular email: **mjos@iki.fi**. PGP keys for general use at: [**https://keybase.io/mjos**](https://keybase.io/mjos). Secure mobile account: **mjos@mjos.fi**. Protonmail PGP keys here: [**mjos@mjos.fi.asc**](https://mjos.fi/mjos@mjos.fi.asc). I keep some software at [**https://github.com/mjosaarinen**](https://github.com/mjosaarinen). ## Work I'm a senior principal security engineer with [ARM](https://www.arm.com/) in [Cambridge, UK](https://goo.gl/maps/ZJu5zoAJMX62). I work on cryptographic algorithms, protocols, embedded systems, and hardware security. ## Research Interests Focus of my current research is in next-generation and quantum resistant cryptographic algorithms. The [NIST Post-Quantum Crypto Project](http://csrc.nist.gov/groups/ST/post-quantum-crypto/) forms the foundation for my research this year, with submission of candidate algorithms at the end of November. As can be seen from my recent publications, I shifted my main research interests from symmetric cryptanalysis to lattice algorithms already a year or two ago. [HILA5](https://mjos.fi/hila5) will be my contribution to the NIST PQC effort. The submission package already lives in [https://github.com/mjosaarinen/hila5](https://github.com/mjosaarinen/hila5). ## Upcoming preprints and publications from recent years (i.e. this decade) * [**HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption**](http://eprint.iacr.org/2017/424). Proc. SAC 2017, LNCS 10719, pp. N/A, Springer, 2017 (to appear). * [**Arithmetic Coding and Blinding Countermeasures for Lattice Signatures**](http://rdcu.be/oHun). To appear in [J. Cryptographic Engineering](http://link.springer.com/journal/13389), Springer 2017. * [**Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography**](http://dx.doi.org/10.1145/3055245.3055254). Proc. IoTPTS '17, pp. 15-22, ACM 2017. * [**The BRUTUS Automatic Cryptanalytic Framework**](http://dx.doi.org/10.1007/s13389-015-0114-1). J. Cryptographic Engineering, Vol. 6, No. 1, pp 75-82. Springer 2016. * [**The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)**](https://tools.ietf.org/html/rfc7693). *With Jean-Philippe Aumasson.* RFC 7693. IETF 2015. * [**WHIRLBOB, the Whirlpool based Variant of STRIBOB**](http://dx.doi.org/10.1007/978-3-319-26502-5_8). *With Billy B. Brumley.* Proc. NordSec 2015, LNCS 9417, pp. 106-122. Springer 2015. * [**STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation**](http://mi.mathnet.ru/eng/mvk146). Mat. Vopr. Kriptogr., Vol. 6, No. 2, pp. 67-78. Steklov Mathematical Institute of RAS 2015. * [**Simple AEAD Hardware Interface (SAEHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor**](http://dx.doi.org/10.1145/2666141.2666144). Proc. TrustED '14, pp. 51-56. ACM 2014. * [**CBEAM: Efficient Authenticated Encryption from Feebly One-Way Phi Functions**](http://dx.doi.org/10.1007/978-3-319-04852-9_13). Proc. CT-RSA 2014. LNCS 8366, pp. 251-269. Springer 2014. * [**Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation**](http://dx.doi.org/10.1007/978-3-319-04852-9_14). Proc. CT-RSA 2014. LNCS 8366, pp. 270-285. Springer 2014. * [**Developing a Grey Hat C2 and RAT for APT Security Training and Assessment**](https://mjos.fi/doc/saarinen_hrpaper.pdf). For GreHack 2013 Hacking Conference. Grenoble, France, 15 November 2013. * [**Related-Key Attacks Against Full Hummingbird-2**](http://dx.doi.org/10.1007/978-3-662-43933-3_24). Proc. FSE 2013. LNCS 8424, pp. 467-482. Springer 2013. * [**A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract)**](https://eprint.iacr.org/2012/317). *With Daniel Engels.* ePrint 2012/317, IACR 2012. * [**The BLUEJAY Ultra-Lightweight Hybrid Cryptosystem**](http://dx.doi.org/10.1109/SPW.2012.11). Proc. TrustED 2012 (SPW 2012), pp. 27-32. IEEE Computer Society 2012. * [**Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes**](http://dx.doi.org/10.1007/978-3-642-34047-5_13). Proc. FSE 2012. LNCS 7549, pp. 216-225. Springer 2012. * [**Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN**](http://dx.doi.org/10.1007/978-3-642-25578-6_11). *With Jean-Philippe Aumasson and Maria Naya-Plasencia.* Proc. INDOCRYPT 2011. LNCS 7107, pp. 134-145. Springer 2011. * [**Cryptographic Analysis of All 4 x 4 - Bit S-Boxes**](http://dx.doi.org/10.1007/978-3-642-28496-0_7). Proc. SAC 2011. LNCS 7118, pp. 118-133. Springer 2012. * [**The Hummingbird-2 Lightweight Authenticated Encryption Algorithm**](http://dx.doi.org/10.1007/978-3-642-25286-0_2). *With Danel Engels, Peter Schweitzer, and Eric M. Smith*. Proc. RFIDSec 2011. LNCS 7055, pp. 19-31, Springer 2012. * [**Cryptanalysis of Hummingbird-1**](http://dx.doi.org/10.1007/978-3-642-21702-9_19). Proc. FSE 2011. LNCS 6733, pp. 328-341, Springer 2011.