BibTeX records: Vincent Rijmen

download as .bib file

@proceedings{DBLP:conf/sacrypt/2023,
  editor       = {Claude Carlet and
                  Kalikinkar Mandal and
                  Vincent Rijmen},
  title        = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference,
                  Fredericton, Canada, August 14-18, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14201},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-53368-6},
  doi          = {10.1007/978-3-031-53368-6},
  isbn         = {978-3-031-53367-9},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PiccioneABCDNPR23,
  author       = {Enrico Piccione and
                  Samuele Andreoli and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  George Petrides and
                  Vincent Rijmen},
  title        = {An Optimal Universal Construction for the Threshold Implementation
                  of Bijective S-Boxes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {10},
  pages        = {6700--6710},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2023.3287534},
  doi          = {10.1109/TIT.2023.3287534},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/PiccioneABCDNPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/OzdemirBR23,
  author       = {Bet{\"{u}}l Askin {\"{O}}zdemir and
                  Tim Beyne and
                  Vincent Rijmen},
  title        = {Multidimensional Linear Cryptanalysis of Feistel Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {1--27},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.1-27},
  doi          = {10.46586/TOSC.V2023.I4.1-27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/OzdemirBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiuRHCW22,
  author       = {Jun Liu and
                  Vincent Rijmen and
                  Yupu Hu and
                  Jie Chen and
                  Baocang Wang},
  title        = {{WARX:} efficient white-box block cipher based on {ARX} primitives
                  and random {MDS} matrix},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-020-3105-1},
  doi          = {10.1007/S11432-020-3105-1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiuRHCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AzimiRSMAR22,
  author       = {Seyyed Arash Azimi and
                  Adri{\'{a}}n Ranea and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri and
                  Mohammad Reza Aref and
                  Vincent Rijmen},
  title        = {A bit-vector differential model for the modular addition by a constant
                  and its applications to differential and impossible-differential cryptanalysis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1797--1855},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01074-8},
  doi          = {10.1007/S10623-022-01074-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AzimiRSMAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/RaneaR22,
  author       = {Adri{\'{a}}n Ranea and
                  Vincent Rijmen},
  title        = {Characteristic automated search of cryptographic algorithms for distinguishing
                  attacks {(CASCADA)}},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {470--481},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12077},
  doi          = {10.1049/ISE2.12077},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/RaneaR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BardehR22,
  author       = {Navid Ghaedi Bardeh and
                  Vincent Rijmen},
  title        = {New Key-Recovery Attack on Reduced-Round {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {43--62},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.43-62},
  doi          = {10.46586/TOSC.V2022.I2.43-62},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BardehR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AskelandDNRZ22,
  author       = {Amund Askeland and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen and
                  Zhenda Zhang},
  editor       = {Ileana Buhan and
                  Tobias Schneider},
  title        = {Guarding the First Order: The Rise of {AES} Maskings},
  booktitle    = {Smart Card Research and Advanced Applications - 21st International
                  Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13820},
  pages        = {103--122},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25319-5\_6},
  doi          = {10.1007/978-3-031-25319-5\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AskelandDNRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BeyneR22,
  author       = {Tim Beyne and
                  Vincent Rijmen},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Differential Cryptanalysis in the Fixed-Key Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13509},
  pages        = {687--716},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15982-4\_23},
  doi          = {10.1007/978-3-031-15982-4\_23},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BeyneR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PosteucaR22,
  author       = {Raluca Posteuca and
                  Vincent Rijmen},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {RAMus- {A} New Lightweight Block Cipher for {RAM} Encryption},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {69--92},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_4},
  doi          = {10.1007/978-3-031-14791-3\_4},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PosteucaR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-14026,
  author       = {Ignacio Fern{\'{a}}ndez{-}Hern{\'{a}}ndez and
                  Sim{\'{o}}n Cancela and
                  Rafael Terris{-}Gallego and
                  Gonzalo Seco{-}Granados and
                  Jos{\'{e}} A. Lopez{-}Salcedo and
                  Cillian O'Driscoll and
                  Jon Winkel and
                  Andrea Dalla Chiara and
                  Carlo Sarto and
                  Vincent Rijmen and
                  Daniel Blonski and
                  Javier de Blas},
  title        = {Semi-Assisted Signal Authentication based on Galileo {ACAS}},
  journal      = {CoRR},
  volume       = {abs/2204.14026},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.14026},
  doi          = {10.48550/ARXIV.2204.14026},
  eprinttype    = {arXiv},
  eprint       = {2204.14026},
  timestamp    = {Sat, 12 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-14026.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BardehR22,
  author       = {Navid Ghaedi Bardeh and
                  Vincent Rijmen},
  title        = {New Key Recovery Attack on Reduced-Round {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {487},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/487},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BardehR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzimiRSMAR22,
  author       = {Seyyed Arash Azimi and
                  Adri{\'{a}}n Ranea and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri and
                  Mohammad Reza Aref and
                  Vincent Rijmen},
  title        = {A Bit-Vector Differential Model for the Modular Addition by a Constant
                  and its Applications to Differential and Impossible-Differential Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {512},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/512},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzimiRSMAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RaneaR22,
  author       = {Adri{\'{a}}n Ranea and
                  Vincent Rijmen},
  title        = {{CASCADA:} Characteristic Automated Search of Cryptographic Algorithms
                  for Distinguishing Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/513},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RaneaR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeyneR22,
  author       = {Tim Beyne and
                  Vincent Rijmen},
  title        = {Differential Cryptanalysis in the Fixed-Key Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {837},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/837},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeyneR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiccioneABCDNPR22,
  author       = {Enrico Piccione and
                  Samuele Andreoli and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  George Petrides and
                  Vincent Rijmen},
  title        = {An Optimal Universal Construction for the Threshold Implementation
                  of Bijective S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1141},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1141},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiccioneABCDNPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SadeghiRB21,
  author       = {Sadegh Sadeghi and
                  Vincent Rijmen and
                  Nasour Bagheri},
  title        = {Proposing an MILP-based method for the experimental verification of
                  difference-based trails: application to SPECK, {SIMECK}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2113--2155},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00904-5},
  doi          = {10.1007/S10623-021-00904-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SadeghiRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Rijmen21,
  author       = {Vincent Rijmen},
  title        = {Editorial},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {15},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09380-5},
  doi          = {10.1007/S00145-021-09380-5},
  timestamp    = {Tue, 11 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Rijmen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/Fernandez-Hernandez21,
  author       = {Ignacio Fern{\'{a}}ndez{-}Hern{\'{a}}ndez and
                  Tomer Ashur and
                  Vincent Rijmen},
  title        = {Analysis and Recommendations for {MAC} and Key Lengths in Delayed
                  Disclosure {GNSS} Authentication Protocols},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {57},
  number       = {3},
  pages        = {1827--1839},
  year         = {2021},
  url          = {https://doi.org/10.1109/TAES.2021.3053129},
  doi          = {10.1109/TAES.2021.3053129},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/Fernandez-Hernandez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhoogheNR21,
  author       = {Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {First-Order Hardware Sharings of the {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/734},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhoogheNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Fernandez-Hernandez21,
  author       = {Ignacio Fern{\'{a}}ndez{-}Hern{\'{a}}ndez and
                  Tomer Ashur and
                  Vincent Rijmen},
  title        = {Analysis and Recommendations for {MAC} and Key Lengths in Delayed
                  Disclosure {GNSS} Authentication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {784},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/784},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Fernandez-Hernandez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/DaemenR20,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Design of Rijndael - The Advanced Encryption Standard (AES), Second
                  Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-662-60769-5},
  doi          = {10.1007/978-3-662-60769-5},
  isbn         = {978-3-662-60768-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DaemenR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuZSRLLFC20,
  author       = {Yunwen Liu and
                  Wenying Zhang and
                  Bing Sun and
                  Vincent Rijmen and
                  Guoqiang Liu and
                  Chao Li and
                  Shaojing Fu and
                  Meichun Cao},
  title        = {The phantom of differential characteristics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2289--2311},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00782-3},
  doi          = {10.1007/S10623-020-00782-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuZSRLLFC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/elektrik/SakalliAAR20,
  author       = {Muharrem Tolga Sakalli and
                  Sedat Akleylek and
                  Kemal Akkanat and
                  Vincent Rijmen},
  title        = {On the automorphisms and isomorphisms of {MDS} matrices and their
                  efficient implementations},
  journal      = {Turkish J. Electr. Eng. Comput. Sci.},
  volume       = {28},
  number       = {1},
  pages        = {275--287},
  year         = {2020},
  url          = {https://doi.org/10.3906/elk-1906-151},
  doi          = {10.3906/ELK-1906-151},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/elektrik/SakalliAAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AshurBR20,
  author       = {Tomer Ashur and
                  Tim Beyne and
                  Vincent Rijmen},
  title        = {Revisiting the Wrong-Key-Randomization Hypothesis},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {2},
  pages        = {567--594},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09343-2},
  doi          = {10.1007/S00145-020-09343-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AshurBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KralevaAR20,
  author       = {Liliya Kraleva and
                  Tomer Ashur and
                  Vincent Rijmen},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {Rotational Cryptanalysis on {MAC} Algorithm Chaskey},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_8},
  doi          = {10.1007/978-3-030-57808-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KralevaAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AzimiRSMAR20,
  author       = {Seyyed Arash Azimi and
                  Adri{\'{a}}n Ranea and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri and
                  Mohammad Reza Aref and
                  Vincent Rijmen},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {A Bit-Vector Differential Model for the Modular Addition by a Constant},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {385--414},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_13},
  doi          = {10.1007/978-3-030-64837-4\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AzimiRSMAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KralevaPR20,
  author       = {Liliya Kraleva and
                  Raluca Posteuca and
                  Vincent Rijmen},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Cryptanalysis of the Permutation Based Algorithm SpoC},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {273--293},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_12},
  doi          = {10.1007/978-3-030-65277-7\_12},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KralevaPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-09563,
  author       = {Anastasiya Gorodilova and
                  Natalia N. Tokareva and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeria Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Roman Lebedev and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Irina Pankratova and
                  Marina Pudovkina and
                  Vincent Rijmen and
                  Aleksei Udovenko},
  title        = {On the Sixth International Olympiad in Cryptography {NSUCRYPTO}},
  journal      = {CoRR},
  volume       = {abs/2005.09563},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.09563},
  eprinttype    = {arXiv},
  eprint       = {2005.09563},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-09563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KralevaAR20,
  author       = {Liliya Kraleva and
                  Tomer Ashur and
                  Vincent Rijmen},
  title        = {Rotational Cryptanalysis on {MAC} Algorithm Chaskey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/538},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KralevaAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SadeghiRB20,
  author       = {Sadegh Sadeghi and
                  Vincent Rijmen and
                  Nasour Bagheri},
  title        = {Proposing an MILP-based Method for the Experimental Verification of
                  Difference Trails},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/632},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SadeghiRB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KralevaMR20,
  author       = {Liliya Kraleva and
                  Nikolai L. Manev and
                  Vincent Rijmen},
  title        = {Correlation distribution analysis of a two-round key-alternating block
                  cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/645},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KralevaMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AzimiRSMAR20,
  author       = {Seyyed Arash Azimi and
                  Adri{\'{a}}n Ranea and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri and
                  Mohammad Reza Aref and
                  Vincent Rijmen},
  title        = {A Bit-Vector Differential Model for the Modular Addition by a Constant},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1025},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1025},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AzimiRSMAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KralevaPR20,
  author       = {Liliya Kraleva and
                  Raluca Posteuca and
                  Vincent Rijmen},
  title        = {Cryptanalysis of the permutation based algorithm SpoC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1072},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1072},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KralevaPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/NikovaNR19,
  author       = {Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Decomposition of permutations in a finite field},
  journal      = {Cryptogr. Commun.},
  volume       = {11},
  number       = {3},
  pages        = {379--384},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12095-018-0317-2},
  doi          = {10.1007/S12095-018-0317-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/NikovaNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/VariciNNR19,
  author       = {Kerem Varici and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Constructions of S-boxes with uniform sharing},
  journal      = {Cryptogr. Commun.},
  volume       = {11},
  number       = {3},
  pages        = {385--398},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12095-018-0345-y},
  doi          = {10.1007/S12095-018-0345-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/VariciNNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACGIK19,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions from the fourth International Students' Olympiad
                  in Cryptography {(NSUCRYPTO)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {138--174},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1517834},
  doi          = {10.1080/01611194.2018.1517834},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangR19,
  author       = {Wenying Zhang and
                  Vincent Rijmen},
  title        = {Division cryptanalysis of block ciphers with a binary diffusion layer},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {87--95},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5151},
  doi          = {10.1049/IET-IFS.2018.5151},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GuzelSARC19,
  author       = {G{\"{u}}ls{\"{u}}m G{\"{o}}zde G{\"{u}}zel and
                  Muharrem Tolga Sakalli and
                  Sedat Akleylek and
                  Vincent Rijmen and
                  Yasemin Cengellenmis},
  title        = {A new matrix form to generate all 3{\unicode{8239}}{\texttimes}{\unicode{8239}}3
                  involutory {MDS} matrices over F2m},
  journal      = {Inf. Process. Lett.},
  volume       = {147},
  pages        = {61--68},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ipl.2019.02.013},
  doi          = {10.1016/J.IPL.2019.02.013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GuzelSARC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/ArribasNR19,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Guards in action: First-order {SCA} secure implementations of {KETJE}
                  without additional randomness},
  journal      = {Microprocess. Microsystems},
  volume       = {71},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.micpro.2019.102859},
  doi          = {10.1016/J.MICPRO.2019.102859},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/ArribasNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerANNR19,
  author       = {Lauren De Meyer and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {M{\&}M: Masks and Macs against Physical Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {25--50},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.25-50},
  doi          = {10.13154/TCHES.V2019.I1.25-50},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MeyerANNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DhoogheNR19,
  author       = {Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Petkova{-}Nikova and
                  Vincent Rijmen},
  title        = {Threshold Implementations in the Robust Probing Model},
  booktitle    = {Proceedings of {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2019, London, UK, November 11, 2019},
  pages        = {30--37},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338467.3358949},
  doi          = {10.1145/3338467.3358949},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DhoogheNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BilginNR19,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {TIS'19: Theory of Implementation Security Workshop 2019},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2701--2702},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3353552},
  doi          = {10.1145/3319535.3353552},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BilginNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/BozilovNR19,
  author       = {Dusan Bozilov and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Design Trade-offs in Threshold Implementations},
  booktitle    = {26th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019},
  pages        = {751--754},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICECS46596.2019.8964835},
  doi          = {10.1109/ICECS46596.2019.8964835},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icecsys/BozilovNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019tis,
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Petkova{-}Nikova and
                  Vincent Rijmen},
  title        = {Proceedings of {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2019, London, UK, November 11, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338467},
  doi          = {10.1145/3338467},
  isbn         = {978-1-4503-6827-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2019tis.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2019-1,
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2},
  doi          = {10.1007/978-3-030-17653-2},
  isbn         = {978-3-030-17652-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2019-2,
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11477},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17656-3},
  doi          = {10.1007/978-3-030-17656-3},
  isbn         = {978-3-030-17655-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2019-3,
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4},
  doi          = {10.1007/978-3-030-17659-4},
  isbn         = {978-3-030-17658-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2019-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhoogheNR19,
  author       = {Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Threshold Implementations in the Robust Probing Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1005},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhoogheNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiRTWCLLL18,
  author       = {Wei Li and
                  Vincent Rijmen and
                  Zhi Tao and
                  Qingju Wang and
                  Hua Chen and
                  Yunwen Liu and
                  Chaoyun Li and
                  Ya Liu},
  title        = {Impossible meet-in-the-middle fault analysis on the {LED} lightweight
                  cipher in VANETs},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {032110:1--032110:13},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9209-0},
  doi          = {10.1007/S11432-017-9209-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiRTWCLLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuRL18,
  author       = {Yunwen Liu and
                  Vincent Rijmen and
                  Gregor Leander},
  title        = {Nonlinear diffusion layers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2469--2484},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0458-5},
  doi          = {10.1007/S10623-018-0458-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/PehlivanogluSAD18,
  author       = {Meltem Kurt PehlIvano{\~{o}}lu and
                  Muharrem Tolga Sakalli and
                  Sedat Akleylek and
                  Nevcihan Duru and
                  Vincent Rijmen},
  title        = {Generalisation of Hadamard matrix to generate involutory {MDS} matrices
                  for lightweight cryptography},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {348--355},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2017.0156},
  doi          = {10.1049/IET-IFS.2017.0156},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/PehlivanogluSAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LiuR18,
  author       = {Yunwen Liu and
                  Vincent Rijmen},
  title        = {New observations on invariant subspace attack},
  journal      = {Inf. Process. Lett.},
  volume       = {138},
  pages        = {27--30},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ipl.2018.01.015},
  doi          = {10.1016/J.IPL.2018.01.015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/LiuR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ArribasBPNR18,
  author       = {Victor Arribas and
                  Beg{\"{u}}l Bilgin and
                  George Petrides and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {269--290},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.269-290},
  doi          = {10.13154/TCHES.V2018.I1.269-290},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ArribasBPNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/ArribasNR18,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje
                  Without Additional Randomness},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {492--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00088},
  doi          = {10.1109/DSD.2018.00088},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/ArribasNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/ArribasNR18,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {VerMI: Verification Tool for Masked Implementations},
  booktitle    = {25th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018},
  pages        = {381--384},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICECS.2018.8617841},
  doi          = {10.1109/ICECS.2018.8617841},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/ArribasNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-1,
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10820},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78381-9},
  doi          = {10.1007/978-3-319-78381-9},
  isbn         = {978-3-319-78380-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-2,
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8},
  doi          = {10.1007/978-3-319-78375-8},
  isbn         = {978-3-319-78374-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-3,
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7},
  doi          = {10.1007/978-3-319-78372-7},
  isbn         = {978-3-319-78371-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/2018-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02059,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions of the Fourth International Students' Olympiad
                  in Cryptography {NSUCRYPTO}},
  journal      = {CoRR},
  volume       = {abs/1806.02059},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02059},
  eprinttype    = {arXiv},
  eprint       = {1806.02059},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VariciNNR18,
  author       = {Kerem Varici and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Constructions of S-boxes with uniform sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VariciNNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovaNR18,
  author       = {Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Decomposition of Permutations in a Finite Field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovaNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasNR18,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje
                  without Additional Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/806},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerANNR18,
  author       = {Lauren De Meyer and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {M{\&}M: Masks and Macs against Physical Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerANNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SajadiehMMR17,
  author       = {Mahdi Sajadieh and
                  Arash Mirzaei and
                  Hamid Mala and
                  Vincent Rijmen},
  title        = {A new counting method to bound the number of active S-boxes in Rijndael
                  and 3D},
  journal      = {Des. Codes Cryptogr.},
  volume       = {83},
  number       = {2},
  pages        = {327--343},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0217-4},
  doi          = {10.1007/S10623-016-0217-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SajadiehMMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AkleylekRSO17,
  author       = {Sedat Akleylek and
                  Vincent Rijmen and
                  Muharrem Tolga Sakalli and
                  Emir {\"{O}}zt{\"{u}}rk},
  title        = {Efficient methods to generate cryptographically significant binary
                  diffusion layers},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {177--187},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2016.0085},
  doi          = {10.1049/IET-IFS.2016.0085},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AkleylekRSO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CnuddeBGNNR17,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Sylvain Guilley},
  title        = {Does Coupling Affect the Security of Masked Implementations?},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_1},
  doi          = {10.1007/978-3-319-64647-3\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CnuddeBGNNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangR17,
  author       = {Wenying Zhang and
                  Vincent Rijmen},
  title        = {Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuR17,
  author       = {Yunwen Liu and
                  Vincent Rijmen},
  title        = {New Observations on Invariant Subspace Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {278},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/278},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasBPNR17,
  author       = {Victor Arribas and
                  Beg{\"{u}}l Bilgin and
                  George Petrides and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1193},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasBPNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasNR17,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {VerMI: Verification Tool for Masked Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiuWR16,
  author       = {Yunwen Liu and
                  Qingju Wang and
                  Vincent Rijmen},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Automatic Search of Linear Trails in {ARX} with Applications to {SPECK}
                  and Chaskey},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {485--499},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_26},
  doi          = {10.1007/978-3-319-39555-5\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LiuWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Masking {AES} With d+1 Shares in Hardware},
  booktitle    = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  pages        = {43},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366.2996428},
  doi          = {10.1145/2996366.2996428},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BilginNR16,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Theory of Implementation Security Workshop (TIs 2016)},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1875--1876},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990488},
  doi          = {10.1145/2976749.2990488},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BilginNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Masking {AES} with d+1 Shares in Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {194--212},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_10},
  doi          = {10.1007/978-3-662-53140-2\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SunL0QR16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Longjiang Qu and
                  Vincent Rijmen},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {New Insights on AES-Like {SPN} Ciphers},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {605--624},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_22},
  doi          = {10.1007/978-3-662-53018-4\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SunL0QR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SunLGRL16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Vincent Rijmen and
                  Ruilin Li},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Provable Security Evaluation of Structures Against Impossible Differential
                  and Zero Correlation Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {196--213},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_8},
  doi          = {10.1007/978-3-662-49890-3\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SunLGRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/ChenFRLFL16,
  author       = {Hua Chen and
                  Jingyi Feng and
                  Vincent Rijmen and
                  Yunwen Liu and
                  Limin Fan and
                  Wei Li},
  title        = {Improved Fault Analysis on {SIMON} Block Cipher Family},
  booktitle    = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2016, Santa Barbara, CA, USA, August 16, 2016},
  pages        = {16--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FDTC.2016.12},
  doi          = {10.1109/FDTC.2016.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/ChenFRLFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AshurR16,
  author       = {Tomer Ashur and
                  Vincent Rijmen},
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {On Linear Hulls and Trails},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  pages        = {269--286},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4\_15},
  doi          = {10.1007/978-3-319-49890-4\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AshurR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016tis,
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366},
  doi          = {10.1145/2996366},
  isbn         = {978-1-4503-4575-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2016tis.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurR16,
  author       = {Tomer Ashur and
                  Vincent Rijmen},
  title        = {On Linear Hulls and Trails in Simon},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGRL16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Vincent Rijmen and
                  Ruilin Li},
  title        = {Provable Security Evaluation of Structures against Impossible Differential
                  and Zero Correlation Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/096},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGRL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GologluRW16,
  author       = {Faruk G{\"{o}}loglu and
                  Vincent Rijmen and
                  Qingju Wang},
  title        = {On the division property of S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GologluRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunL0QR16,
  author       = {Bing Sun and
                  Meicheng Liu and
                  Jian Guo and
                  Longjiang Qu and
                  Vincent Rijmen},
  title        = {New Insights on AES-like {SPN} Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {533},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/533},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunL0QR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Masking {AES} with d+1 Shares in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/631},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AshurBR16,
  author       = {Tomer Ashur and
                  Tim Beyne and
                  Vincent Rijmen},
  title        = {Revisiting the Wrong-Key-Randomization Hypothesis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {990},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/990},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AshurBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CnuddeBGNNR16,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Does Coupling Affect the Security of Masked Implementations?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1080},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1080},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BilginNNRTV15,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Natalia N. Tokareva and
                  Valeriya Vitkup},
  title        = {Threshold implementations of small S-boxes},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {3--33},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0104-7},
  doi          = {10.1007/S12095-014-0104-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BilginNNRTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhangBLR0V15,
  author       = {Wentao Zhang and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Vincent Rijmen and
                  Bohan Yang and
                  Ingrid Verbauwhede},
  title        = {{RECTANGLE:} a bit-slice lightweight block cipher suitable for multiple
                  platforms},
  journal      = {Sci. China Inf. Sci.},
  volume       = {58},
  number       = {12},
  pages        = {1--15},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11432-015-5459-7},
  doi          = {10.1007/S11432-015-5459-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhangBLR0V15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LambergerMSRR15,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Martin Schl{\"{a}}ffer and
                  Christian Rechberger and
                  Vincent Rijmen},
  title        = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {257--296},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-013-9166-5},
  doi          = {10.1007/S00145-013-9166-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/LambergerMSRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/BilginGNNR15,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Trade-Offs for Threshold Implementations Illustrated on {AES}},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {34},
  number       = {7},
  pages        = {1188--1200},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCAD.2015.2419623},
  doi          = {10.1109/TCAD.2015.2419623},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/BilginGNNR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SunLRLCWAL15,
  author       = {Bing Sun and
                  Zhiqiang Liu and
                  Vincent Rijmen and
                  Ruilin Li and
                  Lei Cheng and
                  Qingju Wang and
                  Hoda AlKhzaimi and
                  Chao Li},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Links Among Impossible Differential, Integral and Zero Correlation
                  Linear Cryptanalysis},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {95--115},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_5},
  doi          = {10.1007/978-3-662-47989-6\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SunLRLCWAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangBRL15,
  author       = {Wentao Zhang and
                  Zhenzhen Bao and
                  Vincent Rijmen and
                  Meicheng Liu},
  editor       = {Gregor Leander},
  title        = {A New Classification of 4-bit Optimal S-boxes and Its Application
                  to PRESENT, {RECTANGLE} and {SPONGENT}},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {494--515},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_24},
  doi          = {10.1007/978-3-662-48116-5\_24},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangBRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLRLCWAL15,
  author       = {Bing Sun and
                  Zhiqiang Liu and
                  Vincent Rijmen and
                  Ruilin Li and
                  Lei Cheng and
                  Qingju Wang and
                  Hoda AlKhzaimi and
                  Chao Li},
  title        = {Links among Impossible Differential, Integral and Zero Correlation
                  Linear Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/181},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLRLCWAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangBRL15,
  author       = {Wentao Zhang and
                  Zhenzhen Bao and
                  Vincent Rijmen and
                  Meicheng Liu},
  title        = {A New Classification of 4-bit Optimal S-boxes and its Application
                  to PRESENT, {RECTANGLE} and {SPONGENT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangBRL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgievichGKNPRST15,
  author       = {Sergey Agievich and
                  Anastasiya Gorodilova and
                  Nikolay Kolomeec and
                  Svetla Nikova and
                  Bart Preneel and
                  Vincent Rijmen and
                  George Shushuev and
                  Natalia N. Tokareva and
                  Valeriya Vitkup},
  title        = {Problems, solutions and experience of the first international student's
                  Olympiad in cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BogdanovR14,
  author       = {Andrey Bogdanov and
                  Vincent Rijmen},
  title        = {Linear hulls with correlation zero and linear cryptanalysis of block
                  ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {369--383},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9697-z},
  doi          = {10.1007/S10623-012-9697-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BogdanovR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {A More Efficient {AES} Threshold Implementation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {267--284},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_17},
  doi          = {10.1007/978-3-319-06734-6\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Higher-Order Threshold Implementations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_18},
  doi          = {10.1007/978-3-662-45608-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelRS14,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Collision Attack on 5 Rounds of Gr{\o}stl},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {509--521},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_26},
  doi          = {10.1007/978-3-662-46706-0\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangLVSRT14,
  author       = {Qingju Wang and
                  Zhiqiang Liu and
                  Kerem Varici and
                  Yu Sasaki and
                  Vincent Rijmen and
                  Yosuke Todo},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {Cryptanalysis of Reduced-Round {SIMON32} and {SIMON48}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {143--160},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_9},
  doi          = {10.1007/978-3-319-13039-2\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WangLVSRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangBLRYV14,
  author       = {Wentao Zhang and
                  Zhenzhen Bao and
                  Dongdai Lin and
                  Vincent Rijmen and
                  Bohan Yang and
                  Ingrid Verbauwhede},
  title        = {{RECTANGLE:} {A} Bit-slice Ultra-Lightweight Block Cipher Suitable
                  for Multiple Platforms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangBLRYV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelRS14,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {Collision Attack on 5 Rounds of Gr{\o}stl},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Higher-Order Threshold Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/751},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangLVSRT14,
  author       = {Qingju Wang and
                  Zhiqiang Liu and
                  Kerem Varici and
                  Yu Sasaki and
                  Vincent Rijmen and
                  Yosuke Todo},
  title        = {Cryptanalysis of Reduced-round {SIMON32} and {SIMON48}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {761},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/761},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangLVSRT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/TroutmanR13,
  author       = {Justin Troutman and
                  Vincent Rijmen},
  title        = {Mackerel: {A} Progressive School of Cryptographic Thought},
  journal      = {login Usenix Mag.},
  volume       = {38},
  number       = {6},
  year         = {2013},
  url          = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/mackerel-progressive-school-cryptographic},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/TroutmanR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BogdanovBRWWZ13,
  author       = {Andrey Bogdanov and
                  Christina Boura and
                  Vincent Rijmen and
                  Meiqin Wang and
                  Long Wen and
                  Jingyuan Zhao},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Key Difference Invariant Bias in Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {357--376},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_19},
  doi          = {10.1007/978-3-642-42033-7\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BogdanovBRWWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BilginDNNRA13,
  author       = {Beg{\"{u}}l Bilgin and
                  Joan Daemen and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen and
                  Gilles Van Assche},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Efficient and First-Order {DPA} Resistant Implementations of Keccak},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_13},
  doi          = {10.1007/978-3-319-08302-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BilginDNNRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MendelRTV13,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Ed Dawson},
  title        = {Collisions for the {WIDEA-8} Compression Function},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {162--173},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_11},
  doi          = {10.1007/978-3-642-36095-4\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MendelRTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BogdanovMRRT13,
  author       = {Andrey Bogdanov and
                  Florian Mendel and
                  Francesco Regazzoni and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  editor       = {Shiho Moriai},
  title        = {{ALE:} AES-Based Lightweight Authenticated Encryption},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {447--466},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_23},
  doi          = {10.1007/978-3-662-43933-3\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BogdanovMRRT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginGNNR13,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {A More Efficient {AES} Threshold Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/697},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginGNNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LambergerMRS12,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Vincent Rijmen and
                  Koen Simoens},
  title        = {Memoryless near-collisions via coding theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {1--18},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9484-2},
  doi          = {10.1007/S10623-011-9484-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LambergerMRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BouillaguetDDFKR12,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Orr Dunkelman and
                  Pierre{-}Alain Fouque and
                  Nathan Keller and
                  Vincent Rijmen},
  title        = {Low-Data Complexity Attacks on {AES}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {11},
  pages        = {7002--7017},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2207880},
  doi          = {10.1109/TIT.2012.2207880},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/BouillaguetDDFKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelRTV12,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Differential Analysis of the {LED} Block Cipher},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {190--207},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_13},
  doi          = {10.1007/978-3-642-34961-4\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelRTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/MendelMRT12,
  author       = {Florian Mendel and
                  Bart Mennink and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {A Simple Key-Recovery Attack on McOE-X},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {23--31},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_3},
  doi          = {10.1007/978-3-642-35404-5\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/MendelMRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BilginNNRS12,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Georg St{\"{u}}tz},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Threshold Implementations of All 3 {\texttimes}3 and 4 {\texttimes}4
                  S-Boxes},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_5},
  doi          = {10.1007/978-3-642-33027-8\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BilginNNRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangGR0CB12,
  author       = {Qingju Wang and
                  Dawu Gu and
                  Vincent Rijmen and
                  Ya Liu and
                  Jiazhe Chen and
                  Andrey Bogdanov},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Improved Impossible Differential Attacks on Large-Block Rijndael},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_10},
  doi          = {10.1007/978-3-642-37682-5\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangGR0CB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LambergerMR12,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Vincent Rijmen},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Collision Attack on the Hamsi-256 Compression Function},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {156--171},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_10},
  doi          = {10.1007/978-3-642-34931-7\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LambergerMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Rijmen12,
  author       = {Vincent Rijmen},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {Extracts from the {SHA-3} Competition},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {81--85},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_6},
  doi          = {10.1007/978-3-642-35999-6\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Rijmen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginNNRS12,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Georg St{\"{u}}tz},
  title        = {Threshold Implementations of all 3x3 and 4x4 S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/300},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginNNRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelRTV12,
  author       = {Florian Mendel and
                  Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  title        = {Differential Analysis of the {LED} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelRTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NikovaRS11,
  author       = {Svetla Nikova and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {Secure Hardware Implementation of Nonlinear Functions in the Presence
                  of Glitches},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {292--321},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9085-7},
  doi          = {10.1007/S00145-010-9085-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NikovaRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/DaemenR11,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Rijndael},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1046--1049},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_611},
  doi          = {10.1007/978-1-4419-5906-5\_611},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/DaemenR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/BarretoR11,
  author       = {Paulo S. L. M. Barreto and
                  Vincent Rijmen},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Whirlpool},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1384--1385},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_626},
  doi          = {10.1007/978-1-4419-5906-5\_626},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/BarretoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovR11,
  author       = {Andrey Bogdanov and
                  Vincent Rijmen},
  title        = {Zero-Correlation Linear Cryptanalysis of Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarretoNNRT10,
  author       = {Paulo S. L. M. Barreto and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  title        = {Whirlwind: a new cryptographic hash function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {56},
  number       = {2-3},
  pages        = {141--162},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9391-y},
  doi          = {10.1007/S10623-010-9391-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarretoNNRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DaemenR10,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The First 10 Years of Advanced Encryption},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {6},
  pages        = {72--74},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.193},
  doi          = {10.1109/MSP.2010.193},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DaemenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/VelichkovRP10,
  author       = {Vesselin Velichkov and
                  Vincent Rijmen and
                  Bart Preneel},
  title        = {Algebraic cryptanalysis of a small-scale version of stream cipher
                  Lex},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {49--61},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2009.0118},
  doi          = {10.1049/IET-IFS.2009.0118},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/VelichkovRP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DaemenR10,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Refinements of the {ALRED} construction and {MAC} security claims},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {149--157},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0015},
  doi          = {10.1049/IET-IFS.2010.0015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DaemenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Rijmen10,
  author       = {Vincent Rijmen},
  title        = {Stream ciphers and the eSTREAM project},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {3--11},
  year         = {2010},
  url          = {https://doi.org/10.22042/isecure.2015.2.1.2},
  doi          = {10.22042/ISECURE.2015.2.1.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Rijmen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenTV10,
  author       = {Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Rebound Attack on Reduced-Round Versions of {JH}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {286--303},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_16},
  doi          = {10.1007/978-3-642-13858-4\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MalaDRM10,
  author       = {Hamid Mala and
                  Mohammad Dakhilalian and
                  Vincent Rijmen and
                  Mahmoud Modarres{-}Hashemi},
  editor       = {Guang Gong and
                  Kishan Chand Gupta},
  title        = {Improved Impossible Differential Cryptanalysis of 7-Round {AES-128}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference
                  on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6498},
  pages        = {282--291},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17401-8\_20},
  doi          = {10.1007/978-3-642-17401-8\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MalaDRM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LambergerR10,
  author       = {Mario Lamberger and
                  Vincent Rijmen},
  editor       = {Alex Biryukov and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {Optimal Covering Codes for Finding Near-Collisions},
  booktitle    = {Selected Areas in Cryptography - 17th International Workshop, {SAC}
                  2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6544},
  pages        = {187--197},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19574-7\_13},
  doi          = {10.1007/978-3-642-19574-7\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LambergerR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LambergerMRRS10,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Christian Rechberger and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {198},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/198},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LambergerMRRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rijmen10,
  author       = {Vincent Rijmen},
  title        = {Practical-Titled Attack on {AES-128} Using Chosen-Text Relations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rijmen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BouillaguetDDKRF10,
  author       = {Charles Bouillaguet and
                  Patrick Derbez and
                  Orr Dunkelman and
                  Nathan Keller and
                  Vincent Rijmen and
                  Pierre{-}Alain Fouque},
  title        = {Low Data Complexity Attacks on {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BouillaguetDDKRF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/DaemenR09,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {New criteria for linear maps in AES-like ciphers},
  journal      = {Cryptogr. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {47--69},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12095-008-0003-x},
  doi          = {10.1007/S12095-008-0003-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DaemenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/HeubergerR09,
  author       = {Clemens Heuberger and
                  Vincent Rijmen},
  title        = {Editorial},
  journal      = {Computing},
  volume       = {85},
  number       = {1-2},
  pages        = {1--2},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00607-009-0043-x},
  doi          = {10.1007/S00607-009-0043-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/HeubergerR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/DaemenLPRV09,
  author       = {Joan Daemen and
                  Mario Lamberger and
                  Norbert Pramstaller and
                  Vincent Rijmen and
                  Frederik Vercauteren},
  title        = {Computational aspects of the expected differential probability of
                  4-round {AES} and AES-like ciphers},
  journal      = {Computing},
  volume       = {85},
  number       = {1-2},
  pages        = {85--104},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00607-009-0034-y},
  doi          = {10.1007/S00607-009-0034-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/DaemenLPRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TroutmanR09,
  author       = {Justin Troutman and
                  Vincent Rijmen},
  title        = {Green Cryptography: Cleaner Engineering through Recycling},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {4},
  pages        = {71--73},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.91},
  doi          = {10.1109/MSP.2009.91},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TroutmanR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TroutmanR09a,
  author       = {Justin Troutman and
                  Vincent Rijmen},
  title        = {Green Cryptography: Cleaner Engineering through Recycling, Part 2},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {7},
  number       = {5},
  pages        = {64--65},
  year         = {2009},
  url          = {https://doi.org/10.1109/MSP.2009.120},
  doi          = {10.1109/MSP.2009.120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TroutmanR09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/LambergerNR09,
  author       = {Mario Lamberger and
                  Tomislav Nad and
                  Vincent Rijmen},
  title        = {Numerical solvers and cryptanalysis},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {3},
  pages        = {249--263},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.015},
  doi          = {10.1515/JMC.2009.015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/LambergerNR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LambergerMRRS09,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Christian Rechberger and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Mitsuru Matsui},
  title        = {Rebound Distinguishers: Results on the Full Whirlpool Compression
                  Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_8},
  doi          = {10.1007/978-3-642-10366-7\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LambergerMRRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/DaemenR09,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {Codes and Provable Security of Ciphers - Extended abstract},
  booktitle    = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  pages        = {69--80},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-002-5-69},
  doi          = {10.3233/978-1-60750-002-5-69},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/DaemenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2009,
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7},
  doi          = {10.1007/978-3-642-05445-7},
  isbn         = {978-3-642-05443-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/natosec/23,
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=12139},
  isbn         = {978-1-60750-002-5},
  timestamp    = {Wed, 11 May 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/RijmenBF08,
  author       = {Vincent Rijmen and
                  Paulo S. L. M. Barreto and
                  D{\'{e}}cio Luiz Gazzoni Filho},
  title        = {Rotation symmetry in algebraically generated cryptographic substitution
                  tables},
  journal      = {Inf. Process. Lett.},
  volume       = {106},
  number       = {6},
  pages        = {246--250},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ipl.2007.09.012},
  doi          = {10.1016/J.IPL.2007.09.012},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/RijmenBF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/RechbergerR08,
  author       = {Christian Rechberger and
                  Vincent Rijmen},
  title        = {New Results on {NMAC/HMAC} when Instantiated with Popular Hash Functions},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {347--376},
  year         = {2008},
  url          = {https://doi.org/10.3217/jucs-014-03-0347},
  doi          = {10.3217/JUCS-014-03-0347},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/RechbergerR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LambergerPRR08,
  author       = {Mario Lamberger and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  title        = {Analysis of the Hash Function Design Strategy Called {SMASH}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {8},
  pages        = {3647--3655},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.926420},
  doi          = {10.1109/TIT.2008.926420},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/LambergerPRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/KasperRBRRS08,
  author       = {Emilia K{\"{a}}sper and
                  Vincent Rijmen and
                  Tor E. Bj{\o}rstad and
                  Christian Rechberger and
                  Matthew J. B. Robshaw and
                  Gautham Sekar},
  editor       = {Serge Vaudenay},
  title        = {Correlated Keystreams in Moustique},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {246--257},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_17},
  doi          = {10.1007/978-3-540-68164-9\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/KasperRBRRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NikovaRS08,
  author       = {Svetla Nikova and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Secure Hardware Implementation of Non-linear Functions in the Presence
                  of Glitches},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {218--234},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_14},
  doi          = {10.1007/978-3-642-00730-9\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NikovaRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NikovaRS08,
  author       = {Svetla Nikova and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Using Normal Bases for Compact Hardware Implementations of the {AES}
                  S-Box},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {236--245},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_16},
  doi          = {10.1007/978-3-540-85855-3\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NikovaRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2008,
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5},
  doi          = {10.1007/978-3-540-89754-5},
  isbn         = {978-3-540-89753-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2008,
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7},
  doi          = {10.1007/978-3-540-85886-7},
  isbn         = {978-3-540-85884-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MendelPRR08,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  title        = {Analysis of Step-Reduced {SHA-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MendelPRR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DaemenR07,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Plateau characteristics},
  journal      = {{IET} Inf. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {11--17},
  year         = {2007},
  url          = {https://doi.org/10.1049/iet-ifs:20060099},
  doi          = {10.1049/IET-IFS:20060099},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DaemenR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DaemenR07,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Probability distributions of correlation and differentials in block
                  ciphers},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {221--242},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.011},
  doi          = {10.1515/JMC.2007.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DaemenR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PramstallerLR07,
  author       = {Norbert Pramstaller and
                  Mario Lamberger and
                  Vincent Rijmen},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Second Preimages for Iterated Hash Functions and Their Implications
                  on MACs},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {68--81},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_6},
  doi          = {10.1007/978-3-540-73458-1\_6},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PramstallerLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenR07,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Kaoru Kurosawa},
  title        = {Known-Key Distinguishers for Some Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {315--324},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_19},
  doi          = {10.1007/978-3-540-76900-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MendelR07,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kaoru Kurosawa},
  title        = {Cryptanalysis of the Tiger Hash Function},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {536--550},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_33},
  doi          = {10.1007/978-3-540-76900-2\_33},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MendelR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LambergerPRR07,
  author       = {Mario Lamberger and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Masayuki Abe},
  title        = {Second Preimages for {SMASH}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at
                  the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4377},
  pages        = {101--111},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/11967668\_7},
  doi          = {10.1007/11967668\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LambergerPRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RechbergerR07,
  author       = {Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {On Authentication with {HMAC} and Non-random Properties},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_13},
  doi          = {10.1007/978-3-540-77366-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RechbergerR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelR07,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Colliding Message Pair for 53-Step {HAS-160}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {324--334},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_26},
  doi          = {10.1007/978-3-540-76788-6\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelR07a,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Weaknesses in the {HAS-V} Compression Function},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {335--345},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_27},
  doi          = {10.1007/978-3-540-76788-6\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7021,
  editor       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  title        = {Symmetric Cryptography, 07.01. - 12.01.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07021},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/portals/07021/},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/2007P7021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07,
  author       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  editor       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  title        = {07021 Executive Summary -- Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 07.01. - 12.01.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07021},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/1020},
  timestamp    = {Thu, 10 Jun 2021 13:02:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07a,
  author       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  editor       = {Eli Biham and
                  Helena Handschuh and
                  Stefan Lucks and
                  Vincent Rijmen},
  title        = {07021 Abstracts Collection -- Symmetric Cryptography},
  booktitle    = {Symmetric Cryptography, 07.01. - 12.01.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07021},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2007/1037},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RechbergerRS06,
  author       = {Christian Rechberger and
                  Vincent Rijmen and
                  Nicolas Sklavos},
  title        = {The {NIST} Cryptographic Workshop on Hash Functions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {1},
  pages        = {54--56},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.26},
  doi          = {10.1109/MSP.2006.26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RechbergerRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpga/PramstallerRR06,
  author       = {Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Steven J. E. Wilton and
                  Andr{\'{e}} DeHon},
  title        = {A compact {FPGA} implementation of the hash function whirlpool},
  booktitle    = {Proceedings of the {ACM/SIGDA} 14th International Symposium on Field
                  Programmable Gate Arrays, {FPGA} 2006, Monterey, California, USA,
                  February 22-24, 2006},
  pages        = {159--166},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1117201.1117225},
  doi          = {10.1145/1117201.1117225},
  timestamp    = {Tue, 06 Nov 2018 16:58:23 +0100},
  biburl       = {https://dblp.org/rec/conf/fpga/PramstallerRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPRR06,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Matthew J. B. Robshaw},
  title        = {Analysis of Step-Reduced {SHA-256}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_9},
  doi          = {10.1007/11799313\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MendelPRR06a,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Matthew J. B. Robshaw},
  title        = {The Impact of Carries on the Complexity of Collision Attacks on {SHA-1}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {278--292},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_18},
  doi          = {10.1007/11799313\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MendelPRR06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NikovaRR06,
  author       = {Svetla Nikova and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Threshold Implementations Against Side-Channel Attacks and Glitches},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {529--545},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_38},
  doi          = {10.1007/11935308\_38},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/NikovaRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06,
  author       = {Florian Mendel and
                  Bart Preneel and
                  Vincent Rijmen and
                  Hirotaka Yoshida and
                  Dai Watanabe},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Update on Tiger},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {63--79},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_6},
  doi          = {10.1007/11941378\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MendelPRR06,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {On the Collision Resistance of {RIPEMD-160}},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {101--116},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_8},
  doi          = {10.1007/11836810\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/MendelPRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DaemenR06,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Understanding Two-Round Differentials in {AES}},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {78--94},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_6},
  doi          = {10.1007/11832072\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DaemenR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenR06,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Two-Round {AES} Differentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LambergerPR06,
  author       = {Mario Lamberger and
                  Norbert Pramstaller and
                  Vincent Rijmen},
  title        = {Second Preimages for Iterated Hash Functions Based on a b-Block Bypass},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LambergerPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RechbergerR06,
  author       = {Christian Rechberger and
                  Vincent Rijmen},
  title        = {On Authentication with {HMAC} and Non-Random Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RechbergerR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/RijmenO05,
  author       = {Vincent Rijmen and
                  Elisabeth Oswald},
  editor       = {Alfred Menezes},
  title        = {Update on {SHA-1}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
                  the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3376},
  pages        = {58--71},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30574-3\_6},
  doi          = {10.1007/978-3-540-30574-3\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/RijmenO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenR05,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A New {MAC} Construction {ALRED} and a Specific Instance {ALPHA-MAC}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_1},
  doi          = {10.1007/11502760\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OswaldMPR05,
  author       = {Elisabeth Oswald and
                  Stefan Mangard and
                  Norbert Pramstaller and
                  Vincent Rijmen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A Side-Channel Analysis Resistant Description of the {AES} S-Box},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {413--423},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_28},
  doi          = {10.1007/11502760\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/PramstallerRR05,
  author       = {Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Nigel P. Smart},
  title        = {Exploiting Coding Theory for Collision Attacks on {SHA-1}},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {78--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_7},
  doi          = {10.1007/11586821\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/PramstallerRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PramstallerRR05,
  author       = {Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {Breaking a New Hash Function Design Strategy Called {SMASH}},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {233--244},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_16},
  doi          = {10.1007/11693383\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PramstallerRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PramstallerRR05a,
  author       = {Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Bart Preneel and
                  Stafford E. Tavares},
  title        = {Impact of Rotations in {SHA-1} and Related Hash Functions},
  booktitle    = {Selected Areas in Cryptography, 12th International Workshop, {SAC}
                  2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3897},
  pages        = {261--275},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11693383\_18},
  doi          = {10.1007/11693383\_18},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PramstallerRR05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/MatusiewiczPPRR05,
  author       = {Krystian Matusiewicz and
                  Josef Pieprzyk and
                  Norbert Pramstaller and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Christopher Wolf and
                  Stefan Lucks and
                  Po{-}Wah Yau},
  title        = {Analysis of simplified variants of {SHA-256}},
  booktitle    = {WEWoRC 2005 - Western European Workshop on Research in Cryptology,
                  July 5-7, 2005, Leuven, Belgium},
  series       = {{LNI}},
  volume       = {{P-74}},
  pages        = {123--134},
  publisher    = {{GI}},
  year         = {2005},
  url          = {https://dl.gi.de/handle/20.500.12116/24844},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/MatusiewiczPPRR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aes/2004,
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137765},
  doi          = {10.1007/B137765},
  isbn         = {3-540-26557-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/DaemenR05,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Henk C. A. van Tilborg},
  title        = {Rijndael/AES},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_358},
  doi          = {10.1007/0-387-23483-7\_358},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/DaemenR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RijmenO05,
  author       = {Vincent Rijmen and
                  Elisabeth Oswald},
  title        = {Update on {SHA-1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RijmenO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenR05,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Pelican {MAC} Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenR05a,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Probability distributions of Correlation and Differentials in Block
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenR05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/RijmenO04,
  author       = {Vincent Rijmen and
                  Elisabeth Oswald},
  editor       = {Hans Dobbertin and
                  Vincent Rijmen and
                  Aleksandra Sowa},
  title        = {Representations and Rijndael Descriptions},
  booktitle    = {Advanced Encryption Standard - AES, 4th International Conference,
                  {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3373},
  pages        = {148--158},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11506447\_13},
  doi          = {10.1007/11506447\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/RijmenO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ScaveniusBPCR04,
  author       = {Ove Scavenius and
                  Martin Boesgaard and
                  Thomas Pedersen and
                  Jesper Christiansen and
                  Vincent Rijmen},
  editor       = {Tatsuaki Okamoto},
  title        = {Periodic Properties of Counter Assisted Stream Ciphers},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {39--53},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_4},
  doi          = {10.1007/978-3-540-24660-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ScaveniusBPCR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BechlaghemR04,
  author       = {Malek Bechlaghem and
                  Vincent Rijmen},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Proving Key Usage},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {65--72},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_6},
  doi          = {10.1007/978-3-540-31815-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BechlaghemR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NakaharaRPV03,
  author       = {Jorge Nakahara Jr. and
                  Vincent Rijmen and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {The {MESH} Block Ciphers},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {458--473},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_34},
  doi          = {10.1007/978-3-540-24591-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NakaharaRPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/DaemenR02,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Design of Rijndael: {AES} - The Advanced Encryption Standard},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-662-04722-4},
  doi          = {10.1007/978-3-662-04722-4},
  isbn         = {3-540-42580-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/DaemenR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DaemenR02,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Lars R. Knudsen},
  title        = {{AES} and the Wide Trail Design Strategy},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {108--109},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_7},
  doi          = {10.1007/3-540-46035-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DaemenR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DaemenR02,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Security of a Wide Trail Design},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_1},
  doi          = {10.1007/3-540-36231-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DaemenR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2002,
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9},
  doi          = {10.1007/3-540-45661-9},
  isbn         = {3-540-44009-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BorstPR01,
  author       = {Johan Borst and
                  Bart Preneel and
                  Vincent Rijmen},
  title        = {Cryptography on smart cards},
  journal      = {Comput. Networks},
  volume       = {36},
  number       = {4},
  pages        = {423--435},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1389-1286(01)00164-5},
  doi          = {10.1016/S1389-1286(01)00164-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/BorstPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DaemenKR01,
  author       = {Joan Daemen and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  title        = {Linear Frameworks for Block Ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {22},
  number       = {1},
  pages        = {65--87},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DaemenKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenRPV01,
  author       = {Vincent Rijmen and
                  Bart Van Rompay and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Mitsuru Matsui},
  title        = {Producing Collisions for {PANAMA}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_4},
  doi          = {10.1007/3-540-45473-X\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenRPV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BarretoRNPVK01,
  author       = {Paulo S. L. M. Barreto and
                  Vincent Rijmen and
                  Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle and
                  Hae Yong Kim},
  editor       = {Mitsuru Matsui},
  title        = {Improved {SQUARE} Attacks against Reduced-Round {HIEROCRYPT}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {165--173},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_14},
  doi          = {10.1007/3-540-45473-X\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BarretoRNPVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BihamFMR01,
  author       = {Eli Biham and
                  Vladimir Furman and
                  Michal Misztal and
                  Vincent Rijmen},
  editor       = {Mitsuru Matsui},
  title        = {Differential Cryptanalysis of {Q}},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_15},
  doi          = {10.1007/3-540-45473-X\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BihamFMR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/BarretoKR01,
  author       = {Paulo S. L. M. Barreto and
                  Hae Yong Kim and
                  Vincent Rijmen},
  title        = {Toward a secure public-key blockwise fragile authentication watermarking},
  booktitle    = {Proceedings of the 2001 International Conference on Image Processing,
                  {ICIP} 2001, Thessaloniki, Greece, October 7-10, 2001},
  pages        = {494--497},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICIP.2001.958536},
  doi          = {10.1109/ICIP.2001.958536},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/BarretoKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DaemenR01,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Bahram Honary},
  title        = {The Wide Trail Design Strategy},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {222--238},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_20},
  doi          = {10.1007/3-540-45325-3\_20},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DaemenR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/ParkerR01,
  author       = {Matthew Geoffrey Parker and
                  Vincent Rijmen},
  editor       = {Tor Helleseth and
                  P. Vijay Kumar and
                  Kyeongcheol Yang},
  title        = {The Quantum Entanglement of Binary and Bipolar Sequences},
  booktitle    = {Sequences and their Applications - Proceedings of {SETA} 2001, Bergen,
                  Norway, May 13-17, 2001},
  series       = {Discrete Mathematics and Theoretical Computer Science},
  pages        = {296--309},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4471-0673-9\_22},
  doi          = {10.1007/978-1-4471-0673-9\_22},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/ParkerR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KnudsenR00,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  title        = {Ciphertext-only Attack on Akelarre},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {135--147},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984238},
  doi          = {10.1080/01611190008984238},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KnudsenR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/DaemenR00,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Rijndael for {AES}},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {343--348},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/DaemenR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DHalluinBPR99,
  author       = {Carl D'Halluin and
                  Gert Bijnens and
                  Bart Preneel and
                  Vincent Rijmen},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Equivalent Keys of {HPC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_4},
  doi          = {10.1007/978-3-540-48000-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DHalluinBPR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DHalluinBRP99,
  author       = {Carl D'Halluin and
                  Gert Bijnens and
                  Vincent Rijmen and
                  Bart Preneel},
  editor       = {Lars R. Knudsen},
  title        = {Attack on Six Rounds of Crypton},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_4},
  doi          = {10.1007/3-540-48519-8\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DHalluinBRP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenR99,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Lars R. Knudsen},
  title        = {On the Decorrelated Fast Cipher {(DFC)} and Its Theory},
  booktitle    = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome,
                  Italy, March 24-26, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1636},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48519-8\_7},
  doi          = {10.1007/3-540-48519-8\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcard/RijmenD99,
  author       = {Vincent Rijmen and
                  Joan Daemen},
  editor       = {Scott B. Guthery and
                  Peter Honeyman},
  title        = {Efficient Block Ciphers for Smartcards},
  booktitle    = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard
                  1999, Chicago, Illinois, USA, May 10-11, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/efficient-block-ciphers-smartcards},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcard/RijmenD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98,
  author       = {Lars R. Knudsen and
                  Willi Meier and
                  Bart Preneel and
                  Vincent Rijmen and
                  Sven Verdoolaege},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Analysis Methods for (Alleged) {RC4}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_26},
  doi          = {10.1007/3-540-49649-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DaemenR98,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {The Block Cipher {BKSQ}},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {236--245},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_22},
  doi          = {10.1007/10721064\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DaemenR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DaemenR98a,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {The Block Cipher Rijndael},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {277--284},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_26},
  doi          = {10.1007/10721064\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DaemenR98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KnudsenRRR98,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen and
                  Ronald L. Rivest and
                  Matthew J. B. Robshaw},
  editor       = {Serge Vaudenay},
  title        = {On the Design and Security of {RC2}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {206--221},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_14},
  doi          = {10.1007/3-540-69710-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RompayKR98,
  author       = {Bart Van Rompay and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Serge Vaudenay},
  title        = {Differential Cryptanalysis of the {ICE} Encryption Algorithm},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {270--283},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_18},
  doi          = {10.1007/3-540-69710-1\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RompayKR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HallKRSW98,
  author       = {Chris Hall and
                  John Kelsey and
                  Vincent Rijmen and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {Cryptanalysis of {SPEED}},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {319--338},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_25},
  doi          = {10.1007/3-540-48892-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HallKRSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ac/1997crypto,
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49248-8},
  doi          = {10.1007/3-540-49248-8},
  isbn         = {3-540-65474-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/1997crypto.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RijmenPW97,
  author       = {Vincent Rijmen and
                  Bart Preneel and
                  Erik De Win},
  title        = {On Weaknesses of Non-surjective Round Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {12},
  number       = {3},
  pages        = {253--266},
  year         = {1997},
  url          = {https://doi.org/10.1023/A:1008224928678},
  doi          = {10.1023/A:1008224928678},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RijmenPW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/PreneelRO97,
  author       = {Bart Preneel and
                  Vincent Rijmen and
                  Paul C. van Oorschot},
  title        = {Security analysis of the message authenticator algorithm {(MAA)}},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {8},
  number       = {5},
  pages        = {455--470},
  year         = {1997},
  url          = {https://doi.org/10.1002/ett.4460080504},
  doi          = {10.1002/ETT.4460080504},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/PreneelRO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/PreneelRB97,
  author       = {Bart Preneel and
                  Vincent Rijmen and
                  Antoon Bosselaers},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Recent Developments in the Design of Conventional Cryptographic Algorithms},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {105--130},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_4},
  doi          = {10.1007/3-540-49248-8\_4},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/PreneelRB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BorstKR97,
  author       = {Johan Borst and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Walter Fumy},
  title        = {Two Attacks on Reduced {IDEA}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_1},
  doi          = {10.1007/3-540-69053-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BorstKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP97,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Eli Biham},
  title        = {A Family of Trapdoor Ciphers},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {139--148},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052342},
  doi          = {10.1007/BFB0052342},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenKR97,
  author       = {Joan Daemen and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Eli Biham},
  title        = {The Block Cipher Square},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052343},
  doi          = {10.1007/BFB0052343},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenDPBW96,
  author       = {Vincent Rijmen and
                  Joan Daemen and
                  Bart Preneel and
                  Antoon Bosselaers and
                  Erik De Win},
  editor       = {Dieter Gollmann},
  title        = {The Cipher {SHARK}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {99--111},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_47},
  doi          = {10.1007/3-540-60865-6\_47},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP94,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Bart Preneel},
  title        = {Improved Characteristics for Differential Cryptanalysis of Hash Functions
                  Based on Block Ciphers},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {242--248},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_18},
  doi          = {10.1007/3-540-60590-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenP94a,
  author       = {Vincent Rijmen and
                  Bart Preneel},
  editor       = {Bart Preneel},
  title        = {Cryptanalysis of McGuffin},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {353--358},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_27},
  doi          = {10.1007/3-540-60590-8\_27},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenP94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PreneelNRB93,
  author       = {Bart Preneel and
                  Marnix Nuttin and
                  Vincent Rijmen and
                  Johan Buelens},
  editor       = {Douglas R. Stinson},
  title        = {Cryptanalysis of the {CFB} Mode of the {DES} with a Reduced Number
                  of Rounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_19},
  doi          = {10.1007/3-540-48329-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PreneelNRB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics