Mainly interested in: cryptography, cryptanalysis, software development, photography, arts in general, reading, SUP, the world.
You can contact me through mail: first name [at] domain name [dot] io [public key]
D. J. Bernstein, T. Chou, C. Chuengsatiansup, A. Hülsing, E. Lambooij, T. Lange, R. Niederhagen, C.
van Vredendaal. How to manipulate curve standards: a white paper for the black hat. Security Standardisation Research: Second International Conference, SSR 2015. p. 109-139. LNCS, Volume 9497, Springer
A. Canteaut, E. Lambooij, S. Neves, S. Rasoolzadeh, Y. Sasaki, M. Stevens. Exact Probability of Differential Characteristics Including Dependency between Multiple Rounds. IACR Transactions on Symmetric Cryptology, [S.l.], p. 203-227, June 2017. ISSN 2519-173X, Volume 2017, issue 2.
- Distinguishing iterated encryption. Cryptacus 2017. Radboud University. Nijmegen, the Netherlands. November 2017.
My Master's thesis, 'Cryptanalysis of Simon et al.'
You can download my CV here
PhotoCrypt: an app that encrypts a message
and uses a scrambled photo as the key. You can only decrypt the message once you unscramble the photo.
(IPhone app incoming, but the site works quite well on smaller devices)