2008 | ||
---|---|---|
70 | Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Springer 2008 | |
69 | Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings Springer 2008 | |
68 | EE | Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar: Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257 |
67 | EE | Svetla Nikova, Vincent Rijmen, Martin Schläffer: Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. ICISC 2008: 218-234 |
66 | EE | Svetla Nikova, Vincent Rijmen, Martin Schläffer: Using Normal Bases for Compact Hardware Implementations of the AES S-Box. SCN 2008: 236-245 |
65 | EE | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of the Hash Function Design Strategy Called SMASH. IEEE Transactions on Information Theory 54(8): 3647-3655 (2008) |
64 | EE | Vincent Rijmen, Paulo S. L. M. Barreto, Décio L. Gazzoni Filho: Rotation symmetry in algebraically generated cryptographic substitution tables. Inf. Process. Lett. 106(6): 246-250 (2008) |
63 | Christian Rechberger, Vincent Rijmen: New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. J. UCS 14(3): 347-376 (2008) | |
2007 | ||
62 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 | |
61 | EE | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen: Second Preimages for Iterated Hash Functions and Their Implications on MACs. ACISP 2007: 68-81 |
60 | EE | Lars R. Knudsen, Vincent Rijmen: Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324 |
59 | EE | Florian Mendel, Vincent Rijmen: Cryptanalysis of the Tiger Hash Function. ASIACRYPT 2007: 536-550 |
58 | EE | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Second Preimages for SMASH. CT-RSA 2007: 101-111 |
57 | EE | Christian Rechberger, Vincent Rijmen: On Authentication with HMAC and Non-random Properties. Financial Cryptography 2007: 119-133 |
56 | EE | Florian Mendel, Vincent Rijmen: Colliding Message Pair for 53-Step HAS-160. ICISC 2007: 324-334 |
55 | EE | Florian Mendel, Vincent Rijmen: Weaknesses in the HAS-V Compression Function. ICISC 2007: 335-345 |
54 | EE | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 |
53 | EE | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 |
2006 | ||
52 | EE | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: A compact FPGA implementation of the hash function whirlpool. FPGA 2006: 159-166 |
51 | EE | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of Step-Reduced SHA-256. FSE 2006: 126-143 |
50 | EE | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292 |
49 | EE | Svetla Nikova, Christian Rechberger, Vincent Rijmen: Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545 |
48 | EE | Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe: Update on Tiger. INDOCRYPT 2006: 63-79 |
47 | EE | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116 |
46 | EE | Joan Daemen, Vincent Rijmen: Understanding Two-Round Differentials in AES. SCN 2006: 78-94 |
45 | EE | Christian Rechberger, Vincent Rijmen, Nicolas Sklavos: The NIST Cryptographic Workshop on Hash Functions. IEEE Security & Privacy 4(1): 54-56 (2006) |
2005 | ||
44 | Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers Springer 2005 | |
43 | EE | Vincent Rijmen, Elisabeth Oswald: Update on SHA-1. CT-RSA 2005: 58-71 |
42 | EE | Joan Daemen, Vincent Rijmen: A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. FSE 2005: 1-17 |
41 | EE | Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen: A Side-Channel Analysis Resistant Description of the AES S-Box. FSE 2005: 413-423 |
40 | EE | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Exploiting Coding Theory for Collision Attacks on SHA-1. IMA Int. Conf. 2005: 78-95 |
39 | EE | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Breaking a New Hash Function Design Strategy Called SMASH. Selected Areas in Cryptography 2005: 233-244 |
38 | EE | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Impact of Rotations in SHA-1 and Related Hash Functions. Selected Areas in Cryptography 2005: 261-275 |
37 | Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134 | |
36 | EE | Joan Daemen, Vincent Rijmen: Rijndael/AES. Encyclopedia of Cryptography and Security 2005 |
2004 | ||
35 | EE | Vincent Rijmen, Elisabeth Oswald: Representations and Rijndael Descriptions. AES Conference 2004: 148-158 |
34 | EE | Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen: Periodic Properties of Counter Assisted Stream Ciphers. CT-RSA 2004: 39-53 |
33 | EE | Malek Bechlaghem, Vincent Rijmen: Proving Key Usage. WISA 2004: 65-72 |
2003 | ||
32 | EE | Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle: The MESH Block Ciphers. WISA 2003: 458-473 |
2002 | ||
31 | Joan Daemen, Vincent Rijmen: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers Springer 2002 | |
30 | Joan Daemen, Vincent Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard Springer 2002 | |
29 | EE | Joan Daemen, Vincent Rijmen: AES and the Wide Trail Design Strategy. EUROCRYPT 2002: 108-109 |
28 | EE | Joan Daemen, Vincent Rijmen: Security of a Wide Trail Design. INDOCRYPT 2002: 1-11 |
2001 | ||
27 | EE | Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim: Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. FSE 2001: 165-173 |
26 | EE | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186 |
25 | EE | Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle: Producing Collisions for PANAMA. FSE 2001: 37-51 |
24 | EE | Paulo S. L. M. Barreto, Hae Yong Kim, Vincent Rijmen: Toward a secure public-key blockwise fragile authentication watermarking. ICIP (2) 2001: 494-497 |
23 | EE | Joan Daemen, Vincent Rijmen: The Wide Trail Design Strategy. IMA Int. Conf. 2001: 222-238 |
22 | EE | Johan Borst, Bart Preneel, Vincent Rijmen: Cryptography on smart cards. Computer Networks 36(4): 423-435 (2001) |
21 | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: Linear Frameworks for Block Ciphers. Des. Codes Cryptography 22(1): 65-87 (2001) | |
2000 | ||
20 | Joan Daemen, Vincent Rijmen: Rijndael for AES. AES Candidate Conference 2000: 343-348 | |
1999 | ||
19 | Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen: Equivalent Keys of HPC. ASIACRYPT 1999: 29-42 | |
18 | EE | Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel: Attack on Six Rounds of Crypton. FSE 1999: 46-59 |
17 | EE | Lars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94 |
1998 | ||
16 | Bart Preneel, Vincent Rijmen: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures Springer 1998 | |
15 | EE | Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341 |
14 | Joan Daemen, Vincent Rijmen: The Block Cipher BKSQ. CARDIS 1998: 236-245 | |
13 | Joan Daemen, Vincent Rijmen: The Block Cipher Rijndael. CARDIS 1998: 277-284 | |
12 | EE | Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw: On the Design and Security of RC2. FSE 1998: 206-221 |
11 | EE | Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen: Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283 |
10 | EE | Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 |
1997 | ||
9 | EE | Johan Borst, Lars R. Knudsen, Vincent Rijmen: Two Attacks on Reduced IDEA. EUROCRYPT 1997: 1-13 |
8 | EE | Vincent Rijmen, Bart Preneel: A Family of Trapdoor Ciphers. FSE 1997: 139-148 |
7 | EE | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: The Block Cipher Square. FSE 1997: 149-165 |
6 | EE | Bart Preneel, Vincent Rijmen, Antoon Bosselaers: Recent Developments in the Design of Conventional Cryptographic Algorithms. State of the Art in Applied Cryptography 1997: 105-130 |
5 | Vincent Rijmen, Bart Preneel, Erik De Win: On Weaknesses of Non-surjective Round Functions. Des. Codes Cryptography 12(3): 253-266 (1997) | |
1996 | ||
4 | Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win: The Cipher SHARK. FSE 1996: 99-111 | |
1994 | ||
3 | Vincent Rijmen, Bart Preneel: Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. FSE 1994: 242-248 | |
2 | Vincent Rijmen, Bart Preneel: Cryptanalysis of McGuffin. FSE 1994: 353-358 | |
1993 | ||
1 | EE | Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens: Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. CRYPTO 1993: 212-223 |