2008 |
70 | | Tzong-Chen Wu,
Chin-Laung Lei,
Vincent Rijmen,
Der-Tsai Lee:
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
Springer 2008 |
69 | | Dipanwita Roy Chowdhury,
Vincent Rijmen,
Abhijit Das:
Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings
Springer 2008 |
68 | EE | Emilia Käsper,
Vincent Rijmen,
Tor E. Bjørstad,
Christian Rechberger,
Matthew J. B. Robshaw,
Gautham Sekar:
Correlated Keystreams in Moustique.
AFRICACRYPT 2008: 246-257 |
67 | EE | Svetla Nikova,
Vincent Rijmen,
Martin Schläffer:
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.
ICISC 2008: 218-234 |
66 | EE | Svetla Nikova,
Vincent Rijmen,
Martin Schläffer:
Using Normal Bases for Compact Hardware Implementations of the AES S-Box.
SCN 2008: 236-245 |
65 | EE | Mario Lamberger,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of the Hash Function Design Strategy Called SMASH.
IEEE Transactions on Information Theory 54(8): 3647-3655 (2008) |
64 | EE | Vincent Rijmen,
Paulo S. L. M. Barreto,
Décio L. Gazzoni Filho:
Rotation symmetry in algebraically generated cryptographic substitution tables.
Inf. Process. Lett. 106(6): 246-250 (2008) |
63 | | Christian Rechberger,
Vincent Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions.
J. UCS 14(3): 347-376 (2008) |
2007 |
62 | | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
Symmetric Cryptography, 07.01. - 12.01.2007
Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 |
61 | EE | Norbert Pramstaller,
Mario Lamberger,
Vincent Rijmen:
Second Preimages for Iterated Hash Functions and Their Implications on MACs.
ACISP 2007: 68-81 |
60 | EE | Lars R. Knudsen,
Vincent Rijmen:
Known-Key Distinguishers for Some Block Ciphers.
ASIACRYPT 2007: 315-324 |
59 | EE | Florian Mendel,
Vincent Rijmen:
Cryptanalysis of the Tiger Hash Function.
ASIACRYPT 2007: 536-550 |
58 | EE | Mario Lamberger,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Second Preimages for SMASH.
CT-RSA 2007: 101-111 |
57 | EE | Christian Rechberger,
Vincent Rijmen:
On Authentication with HMAC and Non-random Properties.
Financial Cryptography 2007: 119-133 |
56 | EE | Florian Mendel,
Vincent Rijmen:
Colliding Message Pair for 53-Step HAS-160.
ICISC 2007: 324-334 |
55 | EE | Florian Mendel,
Vincent Rijmen:
Weaknesses in the HAS-V Compression Function.
ICISC 2007: 335-345 |
54 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Abstracts Collection -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
53 | EE | Eli Biham,
Helena Handschuh,
Stefan Lucks,
Vincent Rijmen:
07021 Executive Summary -- Symmetric Cryptography.
Symmetric Cryptography 2007 |
2006 |
52 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
A compact FPGA implementation of the hash function whirlpool.
FPGA 2006: 159-166 |
51 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of Step-Reduced SHA-256.
FSE 2006: 126-143 |
50 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
The Impact of Carries on the Complexity of Collision Attacks on SHA-1.
FSE 2006: 278-292 |
49 | EE | Svetla Nikova,
Christian Rechberger,
Vincent Rijmen:
Threshold Implementations Against Side-Channel Attacks and Glitches.
ICICS 2006: 529-545 |
48 | EE | Florian Mendel,
Bart Preneel,
Vincent Rijmen,
Hirotaka Yoshida,
Dai Watanabe:
Update on Tiger.
INDOCRYPT 2006: 63-79 |
47 | EE | Florian Mendel,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
On the Collision Resistance of RIPEMD-160.
ISC 2006: 101-116 |
46 | EE | Joan Daemen,
Vincent Rijmen:
Understanding Two-Round Differentials in AES.
SCN 2006: 78-94 |
45 | EE | Christian Rechberger,
Vincent Rijmen,
Nicolas Sklavos:
The NIST Cryptographic Workshop on Hash Functions.
IEEE Security & Privacy 4(1): 54-56 (2006) |
2005 |
44 | | Hans Dobbertin,
Vincent Rijmen,
Aleksandra Sowa:
Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers
Springer 2005 |
43 | EE | Vincent Rijmen,
Elisabeth Oswald:
Update on SHA-1.
CT-RSA 2005: 58-71 |
42 | EE | Joan Daemen,
Vincent Rijmen:
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.
FSE 2005: 1-17 |
41 | EE | Elisabeth Oswald,
Stefan Mangard,
Norbert Pramstaller,
Vincent Rijmen:
A Side-Channel Analysis Resistant Description of the AES S-Box.
FSE 2005: 413-423 |
40 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Exploiting Coding Theory for Collision Attacks on SHA-1.
IMA Int. Conf. 2005: 78-95 |
39 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Breaking a New Hash Function Design Strategy Called SMASH.
Selected Areas in Cryptography 2005: 233-244 |
38 | EE | Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Impact of Rotations in SHA-1 and Related Hash Functions.
Selected Areas in Cryptography 2005: 261-275 |
37 | | Krystian Matusiewicz,
Josef Pieprzyk,
Norbert Pramstaller,
Christian Rechberger,
Vincent Rijmen:
Analysis of simplified variants of SHA-256.
WEWoRC 2005: 123-134 |
36 | EE | Joan Daemen,
Vincent Rijmen:
Rijndael/AES.
Encyclopedia of Cryptography and Security 2005 |
2004 |
35 | EE | Vincent Rijmen,
Elisabeth Oswald:
Representations and Rijndael Descriptions.
AES Conference 2004: 148-158 |
34 | EE | Ove Scavenius,
Martin Boesgaard,
Thomas Pedersen,
Jesper Christiansen,
Vincent Rijmen:
Periodic Properties of Counter Assisted Stream Ciphers.
CT-RSA 2004: 39-53 |
33 | EE | Malek Bechlaghem,
Vincent Rijmen:
Proving Key Usage.
WISA 2004: 65-72 |
2003 |
32 | EE | Jorge Nakahara Jr.,
Vincent Rijmen,
Bart Preneel,
Joos Vandewalle:
The MESH Block Ciphers.
WISA 2003: 458-473 |
2002 |
31 | | Joan Daemen,
Vincent Rijmen:
Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers
Springer 2002 |
30 | | Joan Daemen,
Vincent Rijmen:
The Design of Rijndael: AES - The Advanced Encryption Standard
Springer 2002 |
29 | EE | Joan Daemen,
Vincent Rijmen:
AES and the Wide Trail Design Strategy.
EUROCRYPT 2002: 108-109 |
28 | EE | Joan Daemen,
Vincent Rijmen:
Security of a Wide Trail Design.
INDOCRYPT 2002: 1-11 |
2001 |
27 | EE | Paulo S. L. M. Barreto,
Vincent Rijmen,
Jorge Nakahara Jr.,
Bart Preneel,
Joos Vandewalle,
Hae Yong Kim:
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT.
FSE 2001: 165-173 |
26 | EE | Eli Biham,
Vladimir Furman,
Michal Misztal,
Vincent Rijmen:
Differential Cryptanalysis of Q.
FSE 2001: 174-186 |
25 | EE | Vincent Rijmen,
Bart Van Rompay,
Bart Preneel,
Joos Vandewalle:
Producing Collisions for PANAMA.
FSE 2001: 37-51 |
24 | EE | Paulo S. L. M. Barreto,
Hae Yong Kim,
Vincent Rijmen:
Toward a secure public-key blockwise fragile authentication watermarking.
ICIP (2) 2001: 494-497 |
23 | EE | Joan Daemen,
Vincent Rijmen:
The Wide Trail Design Strategy.
IMA Int. Conf. 2001: 222-238 |
22 | EE | Johan Borst,
Bart Preneel,
Vincent Rijmen:
Cryptography on smart cards.
Computer Networks 36(4): 423-435 (2001) |
21 | | Joan Daemen,
Lars R. Knudsen,
Vincent Rijmen:
Linear Frameworks for Block Ciphers.
Des. Codes Cryptography 22(1): 65-87 (2001) |
2000 |
20 | | Joan Daemen,
Vincent Rijmen:
Rijndael for AES.
AES Candidate Conference 2000: 343-348 |
1999 |
19 | | Carl D'Halluin,
Gert Bijnens,
Bart Preneel,
Vincent Rijmen:
Equivalent Keys of HPC.
ASIACRYPT 1999: 29-42 |
18 | EE | Carl D'Halluin,
Gert Bijnens,
Vincent Rijmen,
Bart Preneel:
Attack on Six Rounds of Crypton.
FSE 1999: 46-59 |
17 | EE | Lars R. Knudsen,
Vincent Rijmen:
On the Decorrelated Fast Cipher (DFC) and Its Theory.
FSE 1999: 81-94 |
1998 |
16 | | Bart Preneel,
Vincent Rijmen:
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures
Springer 1998 |
15 | EE | Lars R. Knudsen,
Willi Meier,
Bart Preneel,
Vincent Rijmen,
Sven Verdoolaege:
Analysis Methods for (Alleged) RC4.
ASIACRYPT 1998: 327-341 |
14 | | Joan Daemen,
Vincent Rijmen:
The Block Cipher BKSQ.
CARDIS 1998: 236-245 |
13 | | Joan Daemen,
Vincent Rijmen:
The Block Cipher Rijndael.
CARDIS 1998: 277-284 |
12 | EE | Lars R. Knudsen,
Vincent Rijmen,
Ronald L. Rivest,
Matthew J. B. Robshaw:
On the Design and Security of RC2.
FSE 1998: 206-221 |
11 | EE | Bart Van Rompay,
Lars R. Knudsen,
Vincent Rijmen:
Differential Cryptanalysis of the ICE Encryption Algorithm.
FSE 1998: 270-283 |
10 | EE | Chris Hall,
John Kelsey,
Vincent Rijmen,
Bruce Schneier,
David Wagner:
Cryptanalysis of SPEED.
Selected Areas in Cryptography 1998: 319-338 |
1997 |
9 | EE | Johan Borst,
Lars R. Knudsen,
Vincent Rijmen:
Two Attacks on Reduced IDEA.
EUROCRYPT 1997: 1-13 |
8 | EE | Vincent Rijmen,
Bart Preneel:
A Family of Trapdoor Ciphers.
FSE 1997: 139-148 |
7 | EE | Joan Daemen,
Lars R. Knudsen,
Vincent Rijmen:
The Block Cipher Square.
FSE 1997: 149-165 |
6 | EE | Bart Preneel,
Vincent Rijmen,
Antoon Bosselaers:
Recent Developments in the Design of Conventional Cryptographic Algorithms.
State of the Art in Applied Cryptography 1997: 105-130 |
5 | | Vincent Rijmen,
Bart Preneel,
Erik De Win:
On Weaknesses of Non-surjective Round Functions.
Des. Codes Cryptography 12(3): 253-266 (1997) |
1996 |
4 | | Vincent Rijmen,
Joan Daemen,
Bart Preneel,
Antoon Bosselaers,
Erik De Win:
The Cipher SHARK.
FSE 1996: 99-111 |
1994 |
3 | | Vincent Rijmen,
Bart Preneel:
Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
FSE 1994: 242-248 |
2 | | Vincent Rijmen,
Bart Preneel:
Cryptanalysis of McGuffin.
FSE 1994: 353-358 |
1993 |
1 | EE | Bart Preneel,
Marnix Nuttin,
Vincent Rijmen,
Johan Buelens:
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds.
CRYPTO 1993: 212-223 |