2009 | ||
---|---|---|
77 | Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Springer 2009 | |
76 | Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer: Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 | |
75 | Clemens Heuberger, Vincent Rijmen: Editorial. Computing 85(1-2): 1-2 (2009) | |
74 | Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren: Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Computing 85(1-2): 85-104 (2009) | |
73 | Joan Daemen, Vincent Rijmen: New criteria for linear maps in AES-like ciphers. Cryptography and Communications 1(1): 47-69 (2009) | |
72 | Justin Troutman, Vincent Rijmen: Green Cryptography: Cleaner Engineering through Recycling. IEEE Security & Privacy 7(4): 71-73 (2009) | |
71 | Justin Troutman, Vincent Rijmen: Green Cryptography: Cleaner Engineering through Recycling, Part 2. IEEE Security & Privacy 7(5): 64-65 (2009) | |
2008 | ||
70 | Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Springer 2008 | |
69 | Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings Springer 2008 | |
68 | Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar: Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257 | |
67 | Svetla Nikova, Vincent Rijmen, Martin Schläffer: Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. ICISC 2008: 218-234 | |
66 | Svetla Nikova, Vincent Rijmen, Martin Schläffer: Using Normal Bases for Compact Hardware Implementations of the AES S-Box. SCN 2008: 236-245 | |
65 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of the Hash Function Design Strategy Called SMASH. IEEE Transactions on Information Theory 54(8): 3647-3655 (2008) | |
64 | Vincent Rijmen, Paulo S. L. M. Barreto, Décio L. Gazzoni Filho: Rotation symmetry in algebraically generated cryptographic substitution tables. Inf. Process. Lett. 106(6): 246-250 (2008) | |
63 | Christian Rechberger, Vincent Rijmen: New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. J. UCS 14(3): 347-376 (2008) | |
2007 | ||
62 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 | |
61 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen: Second Preimages for Iterated Hash Functions and Their Implications on MACs. ACISP 2007: 68-81 | |
60 | Lars R. Knudsen, Vincent Rijmen: Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324 | |
59 | Florian Mendel, Vincent Rijmen: Cryptanalysis of the Tiger Hash Function. ASIACRYPT 2007: 536-550 | |
58 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Second Preimages for SMASH. CT-RSA 2007: 101-111 | |
57 | Christian Rechberger, Vincent Rijmen: On Authentication with HMAC and Non-random Properties. Financial Cryptography 2007: 119-133 | |
56 | Florian Mendel, Vincent Rijmen: Colliding Message Pair for 53-Step HAS-160. ICISC 2007: 324-334 | |
55 | Florian Mendel, Vincent Rijmen: Weaknesses in the HAS-V Compression Function. ICISC 2007: 335-345 | |
54 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
53 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
2006 | ||
52 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: A compact FPGA implementation of the hash function whirlpool. FPGA 2006: 159-166 | |
51 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of Step-Reduced SHA-256. FSE 2006: 126-143 | |
50 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292 | |
49 | Svetla Nikova, Christian Rechberger, Vincent Rijmen: Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545 | |
48 | Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe: Update on Tiger. INDOCRYPT 2006: 63-79 | |
47 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116 | |
46 | Joan Daemen, Vincent Rijmen: Understanding Two-Round Differentials in AES. SCN 2006: 78-94 | |
45 | Christian Rechberger, Vincent Rijmen, Nicolas Sklavos: The NIST Cryptographic Workshop on Hash Functions. IEEE Security & Privacy 4(1): 54-56 (2006) | |
2005 | ||
44 | Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers Springer 2005 | |
43 | Vincent Rijmen, Elisabeth Oswald: Update on SHA-1. CT-RSA 2005: 58-71 | |
42 | Joan Daemen, Vincent Rijmen: A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. FSE 2005: 1-17 | |
41 | Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen: A Side-Channel Analysis Resistant Description of the AES S-Box. FSE 2005: 413-423 | |
40 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Exploiting Coding Theory for Collision Attacks on SHA-1. IMA Int. Conf. 2005: 78-95 | |
39 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Breaking a New Hash Function Design Strategy Called SMASH. Selected Areas in Cryptography 2005: 233-244 | |
38 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Impact of Rotations in SHA-1 and Related Hash Functions. Selected Areas in Cryptography 2005: 261-275 | |
37 | Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134 | |
36 | Joan Daemen, Vincent Rijmen: Rijndael/AES. Encyclopedia of Cryptography and Security 2005 | |
2004 | ||
35 | Vincent Rijmen, Elisabeth Oswald: Representations and Rijndael Descriptions. AES Conference 2004: 148-158 | |
34 | Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen: Periodic Properties of Counter Assisted Stream Ciphers. CT-RSA 2004: 39-53 | |
33 | Malek Bechlaghem, Vincent Rijmen: Proving Key Usage. WISA 2004: 65-72 | |
2003 | ||
32 | Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle: The MESH Block Ciphers. WISA 2003: 458-473 | |
2002 | ||
31 | Joan Daemen, Vincent Rijmen: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers Springer 2002 | |
30 | Joan Daemen, Vincent Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard Springer 2002 | |
29 | Joan Daemen, Vincent Rijmen: AES and the Wide Trail Design Strategy. EUROCRYPT 2002: 108-109 | |
28 | Joan Daemen, Vincent Rijmen: Security of a Wide Trail Design. INDOCRYPT 2002: 1-11 | |
2001 | ||
27 | Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim: Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. FSE 2001: 165-173 | |
26 | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186 | |
25 | Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle: Producing Collisions for PANAMA. FSE 2001: 37-51 | |
24 | Paulo S. L. M. Barreto, Hae Yong Kim, Vincent Rijmen: Toward a secure public-key blockwise fragile authentication watermarking. ICIP (2) 2001: 494-497 | |
23 | Joan Daemen, Vincent Rijmen: The Wide Trail Design Strategy. IMA Int. Conf. 2001: 222-238 | |
22 | Johan Borst, Bart Preneel, Vincent Rijmen: Cryptography on smart cards. Computer Networks 36(4): 423-435 (2001) | |
21 | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: Linear Frameworks for Block Ciphers. Des. Codes Cryptography 22(1): 65-87 (2001) | |
2000 | ||
20 | Joan Daemen, Vincent Rijmen: Rijndael for AES. AES Candidate Conference 2000: 343-348 | |
1999 | ||
19 | Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen: Equivalent Keys of HPC. ASIACRYPT 1999: 29-42 | |
18 | Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel: Attack on Six Rounds of Crypton. FSE 1999: 46-59 | |
17 | Lars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94 | |
1998 | ||
16 | Bart Preneel, Vincent Rijmen: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures Springer 1998 | |
15 | Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341 | |
14 | Joan Daemen, Vincent Rijmen: The Block Cipher BKSQ. CARDIS 1998: 236-245 | |
13 | Joan Daemen, Vincent Rijmen: The Block Cipher Rijndael. CARDIS 1998: 277-284 | |
12 | Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw: On the Design and Security of RC2. FSE 1998: 206-221 | |
11 | Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen: Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283 | |
10 | Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 | |
1997 | ||
9 | Johan Borst, Lars R. Knudsen, Vincent Rijmen: Two Attacks on Reduced IDEA. EUROCRYPT 1997: 1-13 | |
8 | Vincent Rijmen, Bart Preneel: A Family of Trapdoor Ciphers. FSE 1997: 139-148 | |
7 | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: The Block Cipher Square. FSE 1997: 149-165 | |
6 | Bart Preneel, Vincent Rijmen, Antoon Bosselaers: Recent Developments in the Design of Conventional Cryptographic Algorithms. State of the Art in Applied Cryptography 1997: 105-130 | |
5 | Vincent Rijmen, Bart Preneel, Erik De Win: On Weaknesses of Non-surjective Round Functions. Des. Codes Cryptography 12(3): 253-266 (1997) | |
1996 | ||
4 | Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win: The Cipher SHARK. FSE 1996: 99-111 | |
1994 | ||
3 | Vincent Rijmen, Bart Preneel: Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. FSE 1994: 242-248 | |
2 | Vincent Rijmen, Bart Preneel: Cryptanalysis of McGuffin. FSE 1994: 353-358 | |
1993 | ||
1 | Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens: Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. CRYPTO 1993: 212-223 |