Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vincent Rijmen
@proceedings{DBLP:conf/sacrypt/2023, editor = {Claude Carlet and Kalikinkar Mandal and Vincent Rijmen}, title = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14201}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-53368-6}, doi = {10.1007/978-3-031-53368-6}, isbn = {978-3-031-53367-9}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PiccioneABCDNPR23, author = {Enrico Piccione and Samuele Andreoli and Lilya Budaghyan and Claude Carlet and Siemen Dhooghe and Svetla Nikova and George Petrides and Vincent Rijmen}, title = {An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {10}, pages = {6700--6710}, year = {2023}, url = {https://doi.org/10.1109/TIT.2023.3287534}, doi = {10.1109/TIT.2023.3287534}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/PiccioneABCDNPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/OzdemirBR23, author = {Bet{\"{u}}l Askin {\"{O}}zdemir and Tim Beyne and Vincent Rijmen}, title = {Multidimensional Linear Cryptanalysis of Feistel Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {1--27}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.1-27}, doi = {10.46586/TOSC.V2023.I4.1-27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/OzdemirBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiuRHCW22, author = {Jun Liu and Vincent Rijmen and Yupu Hu and Jie Chen and Baocang Wang}, title = {{WARX:} efficient white-box block cipher based on {ARX} primitives and random {MDS} matrix}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {3}, year = {2022}, url = {https://doi.org/10.1007/s11432-020-3105-1}, doi = {10.1007/S11432-020-3105-1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiuRHCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AzimiRSMAR22, author = {Seyyed Arash Azimi and Adri{\'{a}}n Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen}, title = {A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1797--1855}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01074-8}, doi = {10.1007/S10623-022-01074-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AzimiRSMAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/RaneaR22, author = {Adri{\'{a}}n Ranea and Vincent Rijmen}, title = {Characteristic automated search of cryptographic algorithms for distinguishing attacks {(CASCADA)}}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {6}, pages = {470--481}, year = {2022}, url = {https://doi.org/10.1049/ise2.12077}, doi = {10.1049/ISE2.12077}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/RaneaR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BardehR22, author = {Navid Ghaedi Bardeh and Vincent Rijmen}, title = {New Key-Recovery Attack on Reduced-Round {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {43--62}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.43-62}, doi = {10.46586/TOSC.V2022.I2.43-62}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BardehR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AskelandDNRZ22, author = {Amund Askeland and Siemen Dhooghe and Svetla Nikova and Vincent Rijmen and Zhenda Zhang}, editor = {Ileana Buhan and Tobias Schneider}, title = {Guarding the First Order: The Rise of {AES} Maskings}, booktitle = {Smart Card Research and Advanced Applications - 21st International Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13820}, pages = {103--122}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25319-5\_6}, doi = {10.1007/978-3-031-25319-5\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AskelandDNRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BeyneR22, author = {Tim Beyne and Vincent Rijmen}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Differential Cryptanalysis in the Fixed-Key Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13509}, pages = {687--716}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15982-4\_23}, doi = {10.1007/978-3-031-15982-4\_23}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BeyneR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PosteucaR22, author = {Raluca Posteuca and Vincent Rijmen}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {RAMus- {A} New Lightweight Block Cipher for {RAM} Encryption}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {69--92}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_4}, doi = {10.1007/978-3-031-14791-3\_4}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PosteucaR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-14026, author = {Ignacio Fern{\'{a}}ndez{-}Hern{\'{a}}ndez and Sim{\'{o}}n Cancela and Rafael Terris{-}Gallego and Gonzalo Seco{-}Granados and Jos{\'{e}} A. Lopez{-}Salcedo and Cillian O'Driscoll and Jon Winkel and Andrea Dalla Chiara and Carlo Sarto and Vincent Rijmen and Daniel Blonski and Javier de Blas}, title = {Semi-Assisted Signal Authentication based on Galileo {ACAS}}, journal = {CoRR}, volume = {abs/2204.14026}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.14026}, doi = {10.48550/ARXIV.2204.14026}, eprinttype = {arXiv}, eprint = {2204.14026}, timestamp = {Sat, 12 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-14026.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BardehR22, author = {Navid Ghaedi Bardeh and Vincent Rijmen}, title = {New Key Recovery Attack on Reduced-Round {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {487}, year = {2022}, url = {https://eprint.iacr.org/2022/487}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BardehR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzimiRSMAR22, author = {Seyyed Arash Azimi and Adri{\'{a}}n Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen}, title = {A Bit-Vector Differential Model for the Modular Addition by a Constant and its Applications to Differential and Impossible-Differential Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {512}, year = {2022}, url = {https://eprint.iacr.org/2022/512}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzimiRSMAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RaneaR22, author = {Adri{\'{a}}n Ranea and Vincent Rijmen}, title = {{CASCADA:} Characteristic Automated Search of Cryptographic Algorithms for Distinguishing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2022}, url = {https://eprint.iacr.org/2022/513}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RaneaR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeyneR22, author = {Tim Beyne and Vincent Rijmen}, title = {Differential Cryptanalysis in the Fixed-Key Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {837}, year = {2022}, url = {https://eprint.iacr.org/2022/837}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeyneR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiccioneABCDNPR22, author = {Enrico Piccione and Samuele Andreoli and Lilya Budaghyan and Claude Carlet and Siemen Dhooghe and Svetla Nikova and George Petrides and Vincent Rijmen}, title = {An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1141}, year = {2022}, url = {https://eprint.iacr.org/2022/1141}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiccioneABCDNPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SadeghiRB21, author = {Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri}, title = {Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, {SIMECK}}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2113--2155}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00904-5}, doi = {10.1007/S10623-021-00904-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SadeghiRB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Rijmen21, author = {Vincent Rijmen}, title = {Editorial}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {15}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09380-5}, doi = {10.1007/S00145-021-09380-5}, timestamp = {Tue, 11 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Rijmen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taes/Fernandez-Hernandez21, author = {Ignacio Fern{\'{a}}ndez{-}Hern{\'{a}}ndez and Tomer Ashur and Vincent Rijmen}, title = {Analysis and Recommendations for {MAC} and Key Lengths in Delayed Disclosure {GNSS} Authentication Protocols}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {57}, number = {3}, pages = {1827--1839}, year = {2021}, url = {https://doi.org/10.1109/TAES.2021.3053129}, doi = {10.1109/TAES.2021.3053129}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taes/Fernandez-Hernandez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhoogheNR21, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, title = {First-Order Hardware Sharings of the {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2021}, url = {https://eprint.iacr.org/2021/734}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhoogheNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Fernandez-Hernandez21, author = {Ignacio Fern{\'{a}}ndez{-}Hern{\'{a}}ndez and Tomer Ashur and Vincent Rijmen}, title = {Analysis and Recommendations for {MAC} and Key Lengths in Delayed Disclosure {GNSS} Authentication Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {784}, year = {2021}, url = {https://eprint.iacr.org/2021/784}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Fernandez-Hernandez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/DaemenR20, author = {Joan Daemen and Vincent Rijmen}, title = {The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-662-60769-5}, doi = {10.1007/978-3-662-60769-5}, isbn = {978-3-662-60768-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DaemenR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuZSRLLFC20, author = {Yunwen Liu and Wenying Zhang and Bing Sun and Vincent Rijmen and Guoqiang Liu and Chao Li and Shaojing Fu and Meichun Cao}, title = {The phantom of differential characteristics}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2289--2311}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00782-3}, doi = {10.1007/S10623-020-00782-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuZSRLLFC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/elektrik/SakalliAAR20, author = {Muharrem Tolga Sakalli and Sedat Akleylek and Kemal Akkanat and Vincent Rijmen}, title = {On the automorphisms and isomorphisms of {MDS} matrices and their efficient implementations}, journal = {Turkish J. Electr. Eng. Comput. Sci.}, volume = {28}, number = {1}, pages = {275--287}, year = {2020}, url = {https://doi.org/10.3906/elk-1906-151}, doi = {10.3906/ELK-1906-151}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/elektrik/SakalliAAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AshurBR20, author = {Tomer Ashur and Tim Beyne and Vincent Rijmen}, title = {Revisiting the Wrong-Key-Randomization Hypothesis}, journal = {J. Cryptol.}, volume = {33}, number = {2}, pages = {567--594}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09343-2}, doi = {10.1007/S00145-020-09343-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AshurBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KralevaAR20, author = {Liliya Kraleva and Tomer Ashur and Vincent Rijmen}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {Rotational Cryptanalysis on {MAC} Algorithm Chaskey}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {153--168}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_8}, doi = {10.1007/978-3-030-57808-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KralevaAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AzimiRSMAR20, author = {Seyyed Arash Azimi and Adri{\'{a}}n Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen}, editor = {Shiho Moriai and Huaxiong Wang}, title = {A Bit-Vector Differential Model for the Modular Addition by a Constant}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12491}, pages = {385--414}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64837-4\_13}, doi = {10.1007/978-3-030-64837-4\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AzimiRSMAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KralevaPR20, author = {Liliya Kraleva and Raluca Posteuca and Vincent Rijmen}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Cryptanalysis of the Permutation Based Algorithm SpoC}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {273--293}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_12}, doi = {10.1007/978-3-030-65277-7\_12}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/KralevaPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-09563, author = {Anastasiya Gorodilova and Natalia N. Tokareva and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeria Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Roman Lebedev and Svetla Nikova and Alexey Oblaukhov and Irina Pankratova and Marina Pudovkina and Vincent Rijmen and Aleksei Udovenko}, title = {On the Sixth International Olympiad in Cryptography {NSUCRYPTO}}, journal = {CoRR}, volume = {abs/2005.09563}, year = {2020}, url = {https://arxiv.org/abs/2005.09563}, eprinttype = {arXiv}, eprint = {2005.09563}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-09563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KralevaAR20, author = {Liliya Kraleva and Tomer Ashur and Vincent Rijmen}, title = {Rotational Cryptanalysis on {MAC} Algorithm Chaskey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2020}, url = {https://eprint.iacr.org/2020/538}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KralevaAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SadeghiRB20, author = {Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri}, title = {Proposing an MILP-based Method for the Experimental Verification of Difference Trails}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2020}, url = {https://eprint.iacr.org/2020/632}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SadeghiRB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KralevaMR20, author = {Liliya Kraleva and Nikolai L. Manev and Vincent Rijmen}, title = {Correlation distribution analysis of a two-round key-alternating block cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2020}, url = {https://eprint.iacr.org/2020/645}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KralevaMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AzimiRSMAR20, author = {Seyyed Arash Azimi and Adri{\'{a}}n Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen}, title = {A Bit-Vector Differential Model for the Modular Addition by a Constant}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1025}, year = {2020}, url = {https://eprint.iacr.org/2020/1025}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AzimiRSMAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KralevaPR20, author = {Liliya Kraleva and Raluca Posteuca and Vincent Rijmen}, title = {Cryptanalysis of the permutation based algorithm SpoC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1072}, year = {2020}, url = {https://eprint.iacr.org/2020/1072}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KralevaPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NikovaNR19, author = {Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Decomposition of permutations in a finite field}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {379--384}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0317-2}, doi = {10.1007/S12095-018-0317-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NikovaNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/VariciNNR19, author = {Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Constructions of S-boxes with uniform sharing}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {385--398}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0345-y}, doi = {10.1007/S12095-018-0345-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/VariciNNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACGIK19, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions from the fourth International Students' Olympiad in Cryptography {(NSUCRYPTO)}}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {138--174}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1517834}, doi = {10.1080/01611194.2018.1517834}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangR19, author = {Wenying Zhang and Vincent Rijmen}, title = {Division cryptanalysis of block ciphers with a binary diffusion layer}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {2}, pages = {87--95}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5151}, doi = {10.1049/IET-IFS.2018.5151}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GuzelSARC19, author = {G{\"{u}}ls{\"{u}}m G{\"{o}}zde G{\"{u}}zel and Muharrem Tolga Sakalli and Sedat Akleylek and Vincent Rijmen and Yasemin Cengellenmis}, title = {A new matrix form to generate all 3{\unicode{8239}}{\texttimes}{\unicode{8239}}3 involutory {MDS} matrices over F2m}, journal = {Inf. Process. Lett.}, volume = {147}, pages = {61--68}, year = {2019}, url = {https://doi.org/10.1016/j.ipl.2019.02.013}, doi = {10.1016/J.IPL.2019.02.013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GuzelSARC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/ArribasNR19, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {Guards in action: First-order {SCA} secure implementations of {KETJE} without additional randomness}, journal = {Microprocess. Microsystems}, volume = {71}, year = {2019}, url = {https://doi.org/10.1016/j.micpro.2019.102859}, doi = {10.1016/J.MICPRO.2019.102859}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/ArribasNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MeyerANNR19, author = {Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {M{\&}M: Masks and Macs against Physical Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {25--50}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.25-50}, doi = {10.13154/TCHES.V2019.I1.25-50}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MeyerANNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DhoogheNR19, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, editor = {Beg{\"{u}}l Bilgin and Svetla Petkova{-}Nikova and Vincent Rijmen}, title = {Threshold Implementations in the Robust Probing Model}, booktitle = {Proceedings of {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2019, London, UK, November 11, 2019}, pages = {30--37}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338467.3358949}, doi = {10.1145/3338467.3358949}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DhoogheNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BilginNR19, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {TIS'19: Theory of Implementation Security Workshop 2019}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2701--2702}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3353552}, doi = {10.1145/3319535.3353552}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BilginNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/BozilovNR19, author = {Dusan Bozilov and Ventzislav Nikov and Vincent Rijmen}, title = {Design Trade-offs in Threshold Implementations}, booktitle = {26th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2019, Genoa, Italy, November 27-29, 2019}, pages = {751--754}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICECS46596.2019.8964835}, doi = {10.1109/ICECS46596.2019.8964835}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icecsys/BozilovNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019tis, editor = {Beg{\"{u}}l Bilgin and Svetla Petkova{-}Nikova and Vincent Rijmen}, title = {Proceedings of {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2019, London, UK, November 11, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338467}, doi = {10.1145/3338467}, isbn = {978-1-4503-6827-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2019tis.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-1, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2}, doi = {10.1007/978-3-030-17653-2}, isbn = {978-3-030-17652-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-2, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3}, doi = {10.1007/978-3-030-17656-3}, isbn = {978-3-030-17655-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2019-3, editor = {Yuval Ishai and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4}, doi = {10.1007/978-3-030-17659-4}, isbn = {978-3-030-17658-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2019-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhoogheNR19, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, title = {Threshold Implementations in the Robust Probing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1005}, year = {2019}, url = {https://eprint.iacr.org/2019/1005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhoogheNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiRTWCLLL18, author = {Wei Li and Vincent Rijmen and Zhi Tao and Qingju Wang and Hua Chen and Yunwen Liu and Chaoyun Li and Ya Liu}, title = {Impossible meet-in-the-middle fault analysis on the {LED} lightweight cipher in VANETs}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {032110:1--032110:13}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9209-0}, doi = {10.1007/S11432-017-9209-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/LiRTWCLLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuRL18, author = {Yunwen Liu and Vincent Rijmen and Gregor Leander}, title = {Nonlinear diffusion layers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2469--2484}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0458-5}, doi = {10.1007/S10623-018-0458-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/PehlivanogluSAD18, author = {Meltem Kurt PehlIvano{\~{o}}lu and Muharrem Tolga Sakalli and Sedat Akleylek and Nevcihan Duru and Vincent Rijmen}, title = {Generalisation of Hadamard matrix to generate involutory {MDS} matrices for lightweight cryptography}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {4}, pages = {348--355}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2017.0156}, doi = {10.1049/IET-IFS.2017.0156}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/PehlivanogluSAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LiuR18, author = {Yunwen Liu and Vincent Rijmen}, title = {New observations on invariant subspace attack}, journal = {Inf. Process. Lett.}, volume = {138}, pages = {27--30}, year = {2018}, url = {https://doi.org/10.1016/j.ipl.2018.01.015}, doi = {10.1016/J.IPL.2018.01.015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/LiuR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ArribasBPNR18, author = {Victor Arribas and Beg{\"{u}}l Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen}, title = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {269--290}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.269-290}, doi = {10.13154/TCHES.V2018.I1.269-290}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ArribasBPNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/ArribasNR18, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje Without Additional Randomness}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {492--499}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00088}, doi = {10.1109/DSD.2018.00088}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/ArribasNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/ArribasNR18, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {VerMI: Verification Tool for Masked Implementations}, booktitle = {25th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018}, pages = {381--384}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICECS.2018.8617841}, doi = {10.1109/ICECS.2018.8617841}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/ArribasNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2018-1, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9}, doi = {10.1007/978-3-319-78381-9}, isbn = {978-3-319-78380-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2018-2, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8}, doi = {10.1007/978-3-319-78375-8}, isbn = {978-3-319-78374-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/2018-3, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7}, doi = {10.1007/978-3-319-78372-7}, isbn = {978-3-319-78371-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/2018-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02059, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions of the Fourth International Students' Olympiad in Cryptography {NSUCRYPTO}}, journal = {CoRR}, volume = {abs/1806.02059}, year = {2018}, url = {http://arxiv.org/abs/1806.02059}, eprinttype = {arXiv}, eprint = {1806.02059}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VariciNNR18, author = {Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Constructions of S-boxes with uniform sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2018}, url = {http://eprint.iacr.org/2018/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VariciNNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovaNR18, author = {Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Decomposition of Permutations in a Finite Field}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2018}, url = {http://eprint.iacr.org/2018/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovaNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasNR18, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje without Additional Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2018}, url = {https://eprint.iacr.org/2018/806}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerANNR18, author = {Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {M{\&}M: Masks and Macs against Physical Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2018}, url = {https://eprint.iacr.org/2018/1195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerANNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SajadiehMMR17, author = {Mahdi Sajadieh and Arash Mirzaei and Hamid Mala and Vincent Rijmen}, title = {A new counting method to bound the number of active S-boxes in Rijndael and 3D}, journal = {Des. Codes Cryptogr.}, volume = {83}, number = {2}, pages = {327--343}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0217-4}, doi = {10.1007/S10623-016-0217-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SajadiehMMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AkleylekRSO17, author = {Sedat Akleylek and Vincent Rijmen and Muharrem Tolga Sakalli and Emir {\"{O}}zt{\"{u}}rk}, title = {Efficient methods to generate cryptographically significant binary diffusion layers}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {4}, pages = {177--187}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2016.0085}, doi = {10.1049/IET-IFS.2016.0085}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/AkleylekRSO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CnuddeBGNNR17, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, editor = {Sylvain Guilley}, title = {Does Coupling Affect the Security of Masked Implementations?}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {1--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_1}, doi = {10.1007/978-3-319-64647-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CnuddeBGNNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangR17, author = {Wenying Zhang and Vincent Rijmen}, title = {Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2017}, url = {http://eprint.iacr.org/2017/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuR17, author = {Yunwen Liu and Vincent Rijmen}, title = {New Observations on Invariant Subspace Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2017}, url = {http://eprint.iacr.org/2017/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasBPNR17, author = {Victor Arribas and Beg{\"{u}}l Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen}, title = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2017}, url = {http://eprint.iacr.org/2017/1193}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasBPNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasNR17, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {VerMI: Verification Tool for Masked Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2017}, url = {http://eprint.iacr.org/2017/1227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiuWR16, author = {Yunwen Liu and Qingju Wang and Vincent Rijmen}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Automatic Search of Linear Trails in {ARX} with Applications to {SPECK} and Chaskey}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {485--499}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_26}, doi = {10.1007/978-3-319-39555-5\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiuWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Masking {AES} With d+1 Shares in Hardware}, booktitle = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, pages = {43}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366.2996428}, doi = {10.1145/2996366.2996428}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BilginNR16, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Theory of Implementation Security Workshop (TIs 2016)}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1875--1876}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2990488}, doi = {10.1145/2976749.2990488}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BilginNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Masking {AES} with d+1 Shares in Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {194--212}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_10}, doi = {10.1007/978-3-662-53140-2\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SunL0QR16, author = {Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen}, editor = {Matthew Robshaw and Jonathan Katz}, title = {New Insights on AES-Like {SPN} Ciphers}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {605--624}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_22}, doi = {10.1007/978-3-662-53018-4\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SunL0QR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SunLGRL16, author = {Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {196--213}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_8}, doi = {10.1007/978-3-662-49890-3\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SunLGRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/ChenFRLFL16, author = {Hua Chen and Jingyi Feng and Vincent Rijmen and Yunwen Liu and Limin Fan and Wei Li}, title = {Improved Fault Analysis on {SIMON} Block Cipher Family}, booktitle = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2016, Santa Barbara, CA, USA, August 16, 2016}, pages = {16--24}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FDTC.2016.12}, doi = {10.1109/FDTC.2016.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/ChenFRLFL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AshurR16, author = {Tomer Ashur and Vincent Rijmen}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {On Linear Hulls and Trails}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {269--286}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_15}, doi = {10.1007/978-3-319-49890-4\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AshurR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016tis, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366}, doi = {10.1145/2996366}, isbn = {978-1-4503-4575-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2016tis.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurR16, author = {Tomer Ashur and Vincent Rijmen}, title = {On Linear Hulls and Trails in Simon}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2016}, url = {http://eprint.iacr.org/2016/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGRL16, author = {Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li}, title = {Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2016}, url = {http://eprint.iacr.org/2016/096}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGRL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GologluRW16, author = {Faruk G{\"{o}}loglu and Vincent Rijmen and Qingju Wang}, title = {On the division property of S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2016}, url = {http://eprint.iacr.org/2016/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GologluRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunL0QR16, author = {Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen}, title = {New Insights on AES-like {SPN} Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {533}, year = {2016}, url = {http://eprint.iacr.org/2016/533}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunL0QR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Masking {AES} with d+1 Shares in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2016}, url = {http://eprint.iacr.org/2016/631}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AshurBR16, author = {Tomer Ashur and Tim Beyne and Vincent Rijmen}, title = {Revisiting the Wrong-Key-Randomization Hypothesis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {990}, year = {2016}, url = {http://eprint.iacr.org/2016/990}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AshurBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CnuddeBGNNR16, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, title = {Does Coupling Affect the Security of Masked Implementations?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2016}, url = {http://eprint.iacr.org/2016/1080}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BilginNNRTV15, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Natalia N. Tokareva and Valeriya Vitkup}, title = {Threshold implementations of small S-boxes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {3--33}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0104-7}, doi = {10.1007/S12095-014-0104-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BilginNNRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangBLR0V15, author = {Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede}, title = {{RECTANGLE:} a bit-slice lightweight block cipher suitable for multiple platforms}, journal = {Sci. China Inf. Sci.}, volume = {58}, number = {12}, pages = {1--15}, year = {2015}, url = {https://doi.org/10.1007/s11432-015-5459-7}, doi = {10.1007/S11432-015-5459-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangBLR0V15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LambergerMSRR15, author = {Mario Lamberger and Florian Mendel and Martin Schl{\"{a}}ffer and Christian Rechberger and Vincent Rijmen}, title = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {257--296}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9166-5}, doi = {10.1007/S00145-013-9166-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/LambergerMSRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/BilginGNNR15, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Trade-Offs for Threshold Implementations Illustrated on {AES}}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {7}, pages = {1188--1200}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2419623}, doi = {10.1109/TCAD.2015.2419623}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/BilginGNNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SunLRLCWAL15, author = {Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda AlKhzaimi and Chao Li}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {95--115}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_5}, doi = {10.1007/978-3-662-47989-6\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SunLRLCWAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangBRL15, author = {Wentao Zhang and Zhenzhen Bao and Vincent Rijmen and Meicheng Liu}, editor = {Gregor Leander}, title = {A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, {RECTANGLE} and {SPONGENT}}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {494--515}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_24}, doi = {10.1007/978-3-662-48116-5\_24}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangBRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLRLCWAL15, author = {Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda AlKhzaimi and Chao Li}, title = {Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2015}, url = {http://eprint.iacr.org/2015/181}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLRLCWAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangBRL15, author = {Wentao Zhang and Zhenzhen Bao and Vincent Rijmen and Meicheng Liu}, title = {A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, {RECTANGLE} and {SPONGENT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2015}, url = {http://eprint.iacr.org/2015/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangBRL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgievichGKNPRST15, author = {Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia N. Tokareva and Valeriya Vitkup}, title = {Problems, solutions and experience of the first international student's Olympiad in cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2015}, url = {http://eprint.iacr.org/2015/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BogdanovR14, author = {Andrey Bogdanov and Vincent Rijmen}, title = {Linear hulls with correlation zero and linear cryptanalysis of block ciphers}, journal = {Des. Codes Cryptogr.}, volume = {70}, number = {3}, pages = {369--383}, year = {2014}, url = {https://doi.org/10.1007/s10623-012-9697-z}, doi = {10.1007/S10623-012-9697-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BogdanovR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {David Pointcheval and Damien Vergnaud}, title = {A More Efficient {AES} Threshold Implementation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {267--284}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_17}, doi = {10.1007/978-3-319-06734-6\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Higher-Order Threshold Implementations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {326--343}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_18}, doi = {10.1007/978-3-662-45608-8\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelRS14, author = {Florian Mendel and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Carlos Cid and Christian Rechberger}, title = {Collision Attack on 5 Rounds of Gr{\o}stl}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {509--521}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_26}, doi = {10.1007/978-3-662-46706-0\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WangLVSRT14, author = {Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {Cryptanalysis of Reduced-Round {SIMON32} and {SIMON48}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {143--160}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_9}, doi = {10.1007/978-3-319-13039-2\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WangLVSRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangBLRYV14, author = {Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede}, title = {{RECTANGLE:} {A} Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2014}, url = {http://eprint.iacr.org/2014/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangBLRYV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelRS14, author = {Florian Mendel and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {Collision Attack on 5 Rounds of Gr{\o}stl}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2014}, url = {http://eprint.iacr.org/2014/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Higher-Order Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2014}, url = {http://eprint.iacr.org/2014/751}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangLVSRT14, author = {Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo}, title = {Cryptanalysis of Reduced-round {SIMON32} and {SIMON48}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {761}, year = {2014}, url = {http://eprint.iacr.org/2014/761}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangLVSRT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/TroutmanR13, author = {Justin Troutman and Vincent Rijmen}, title = {Mackerel: {A} Progressive School of Cryptographic Thought}, journal = {login Usenix Mag.}, volume = {38}, number = {6}, year = {2013}, url = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/mackerel-progressive-school-cryptographic}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/TroutmanR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BogdanovBRWWZ13, author = {Andrey Bogdanov and Christina Boura and Vincent Rijmen and Meiqin Wang and Long Wen and Jingyuan Zhao}, editor = {Kazue Sako and Palash Sarkar}, title = {Key Difference Invariant Bias in Block Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {357--376}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_19}, doi = {10.1007/978-3-642-42033-7\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BogdanovBRWWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BilginDNNRA13, author = {Beg{\"{u}}l Bilgin and Joan Daemen and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen and Gilles Van Assche}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Efficient and First-Order {DPA} Resistant Implementations of Keccak}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {187--199}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_13}, doi = {10.1007/978-3-319-08302-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BilginDNNRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MendelRTV13, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, editor = {Ed Dawson}, title = {Collisions for the {WIDEA-8} Compression Function}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {162--173}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_11}, doi = {10.1007/978-3-642-36095-4\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MendelRTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BogdanovMRRT13, author = {Andrey Bogdanov and Florian Mendel and Francesco Regazzoni and Vincent Rijmen and Elmar Tischhauser}, editor = {Shiho Moriai}, title = {{ALE:} AES-Based Lightweight Authenticated Encryption}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {447--466}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_23}, doi = {10.1007/978-3-662-43933-3\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BogdanovMRRT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginGNNR13, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {A More Efficient {AES} Threshold Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2013}, url = {http://eprint.iacr.org/2013/697}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginGNNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LambergerMRS12, author = {Mario Lamberger and Florian Mendel and Vincent Rijmen and Koen Simoens}, title = {Memoryless near-collisions via coding theory}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9484-2}, doi = {10.1007/S10623-011-9484-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LambergerMRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BouillaguetDDFKR12, author = {Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Pierre{-}Alain Fouque and Nathan Keller and Vincent Rijmen}, title = {Low-Data Complexity Attacks on {AES}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {11}, pages = {7002--7017}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2207880}, doi = {10.1109/TIT.2012.2207880}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/BouillaguetDDFKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MendelRTV12, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Differential Analysis of the {LED} Block Cipher}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {190--207}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_13}, doi = {10.1007/978-3-642-34961-4\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/MendelRTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/MendelMRT12, author = {Florian Mendel and Bart Mennink and Vincent Rijmen and Elmar Tischhauser}, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {A Simple Key-Recovery Attack on McOE-X}, booktitle = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, pages = {23--31}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5\_3}, doi = {10.1007/978-3-642-35404-5\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/MendelMRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BilginNNRS12, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg St{\"{u}}tz}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Threshold Implementations of All 3 {\texttimes}3 and 4 {\texttimes}4 S-Boxes}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {76--91}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_5}, doi = {10.1007/978-3-642-33027-8\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BilginNNRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangGR0CB12, author = {Qingju Wang and Dawu Gu and Vincent Rijmen and Ya Liu and Jiazhe Chen and Andrey Bogdanov}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Improved Impossible Differential Attacks on Large-Block Rijndael}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {126--140}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_10}, doi = {10.1007/978-3-642-37682-5\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WangGR0CB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/LambergerMR12, author = {Mario Lamberger and Florian Mendel and Vincent Rijmen}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Collision Attack on the Hamsi-256 Compression Function}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {156--171}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_10}, doi = {10.1007/978-3-642-34931-7\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/LambergerMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Rijmen12, author = {Vincent Rijmen}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {Extracts from the {SHA-3} Competition}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {81--85}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_6}, doi = {10.1007/978-3-642-35999-6\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Rijmen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginNNRS12, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg St{\"{u}}tz}, title = {Threshold Implementations of all 3x3 and 4x4 S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2012}, url = {http://eprint.iacr.org/2012/300}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginNNRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelRTV12, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, title = {Differential Analysis of the {LED} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2012}, url = {http://eprint.iacr.org/2012/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelRTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NikovaRS11, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {292--321}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9085-7}, doi = {10.1007/S00145-010-9085-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NikovaRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/DaemenR11, author = {Joan Daemen and Vincent Rijmen}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Rijndael}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1046--1049}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_611}, doi = {10.1007/978-1-4419-5906-5\_611}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/DaemenR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/BarretoR11, author = {Paulo S. L. M. Barreto and Vincent Rijmen}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Whirlpool}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1384--1385}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_626}, doi = {10.1007/978-1-4419-5906-5\_626}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/BarretoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovR11, author = {Andrey Bogdanov and Vincent Rijmen}, title = {Zero-Correlation Linear Cryptanalysis of Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2011}, url = {http://eprint.iacr.org/2011/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarretoNNRT10, author = {Paulo S. L. M. Barreto and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen and Elmar Tischhauser}, title = {Whirlwind: a new cryptographic hash function}, journal = {Des. Codes Cryptogr.}, volume = {56}, number = {2-3}, pages = {141--162}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9391-y}, doi = {10.1007/S10623-010-9391-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarretoNNRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DaemenR10, author = {Joan Daemen and Vincent Rijmen}, title = {The First 10 Years of Advanced Encryption}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {72--74}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.193}, doi = {10.1109/MSP.2010.193}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DaemenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/VelichkovRP10, author = {Vesselin Velichkov and Vincent Rijmen and Bart Preneel}, title = {Algebraic cryptanalysis of a small-scale version of stream cipher Lex}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {2}, pages = {49--61}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2009.0118}, doi = {10.1049/IET-IFS.2009.0118}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/VelichkovRP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DaemenR10, author = {Joan Daemen and Vincent Rijmen}, title = {Refinements of the {ALRED} construction and {MAC} security claims}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {149--157}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2010.0015}, doi = {10.1049/IET-IFS.2010.0015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DaemenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Rijmen10, author = {Vincent Rijmen}, title = {Stream ciphers and the eSTREAM project}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {2}, number = {1}, pages = {3--11}, year = {2010}, url = {https://doi.org/10.22042/isecure.2015.2.1.2}, doi = {10.22042/ISECURE.2015.2.1.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Rijmen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenTV10, author = {Vincent Rijmen and Deniz Toz and Kerem Varici}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Rebound Attack on Reduced-Round Versions of {JH}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {286--303}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_16}, doi = {10.1007/978-3-642-13858-4\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MalaDRM10, author = {Hamid Mala and Mohammad Dakhilalian and Vincent Rijmen and Mahmoud Modarres{-}Hashemi}, editor = {Guang Gong and Kishan Chand Gupta}, title = {Improved Impossible Differential Cryptanalysis of 7-Round {AES-128}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6498}, pages = {282--291}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17401-8\_20}, doi = {10.1007/978-3-642-17401-8\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MalaDRM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LambergerR10, author = {Mario Lamberger and Vincent Rijmen}, editor = {Alex Biryukov and Guang Gong and Douglas R. Stinson}, title = {Optimal Covering Codes for Finding Near-Collisions}, booktitle = {Selected Areas in Cryptography - 17th International Workshop, {SAC} 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6544}, pages = {187--197}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19574-7\_13}, doi = {10.1007/978-3-642-19574-7\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LambergerR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LambergerMRRS10, author = {Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {198}, year = {2010}, url = {http://eprint.iacr.org/2010/198}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LambergerMRRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rijmen10, author = {Vincent Rijmen}, title = {Practical-Titled Attack on {AES-128} Using Chosen-Text Relations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2010}, url = {http://eprint.iacr.org/2010/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rijmen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BouillaguetDDKRF10, author = {Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre{-}Alain Fouque}, title = {Low Data Complexity Attacks on {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2010}, url = {http://eprint.iacr.org/2010/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BouillaguetDDKRF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DaemenR09, author = {Joan Daemen and Vincent Rijmen}, title = {New criteria for linear maps in AES-like ciphers}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {47--69}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0003-x}, doi = {10.1007/S12095-008-0003-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DaemenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/HeubergerR09, author = {Clemens Heuberger and Vincent Rijmen}, title = {Editorial}, journal = {Computing}, volume = {85}, number = {1-2}, pages = {1--2}, year = {2009}, url = {https://doi.org/10.1007/s00607-009-0043-x}, doi = {10.1007/S00607-009-0043-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/HeubergerR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/DaemenLPRV09, author = {Joan Daemen and Mario Lamberger and Norbert Pramstaller and Vincent Rijmen and Frederik Vercauteren}, title = {Computational aspects of the expected differential probability of 4-round {AES} and AES-like ciphers}, journal = {Computing}, volume = {85}, number = {1-2}, pages = {85--104}, year = {2009}, url = {https://doi.org/10.1007/s00607-009-0034-y}, doi = {10.1007/S00607-009-0034-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/DaemenLPRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TroutmanR09, author = {Justin Troutman and Vincent Rijmen}, title = {Green Cryptography: Cleaner Engineering through Recycling}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {4}, pages = {71--73}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.91}, doi = {10.1109/MSP.2009.91}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TroutmanR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TroutmanR09a, author = {Justin Troutman and Vincent Rijmen}, title = {Green Cryptography: Cleaner Engineering through Recycling, Part 2}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {5}, pages = {64--65}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.120}, doi = {10.1109/MSP.2009.120}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TroutmanR09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/LambergerNR09, author = {Mario Lamberger and Tomislav Nad and Vincent Rijmen}, title = {Numerical solvers and cryptanalysis}, journal = {J. Math. Cryptol.}, volume = {3}, number = {3}, pages = {249--263}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.015}, doi = {10.1515/JMC.2009.015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/LambergerNR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LambergerMRRS09, author = {Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Mitsuru Matsui}, title = {Rebound Distinguishers: Results on the Full Whirlpool Compression Function}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {126--143}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_8}, doi = {10.1007/978-3-642-10366-7\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LambergerMRRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/DaemenR09, author = {Joan Daemen and Vincent Rijmen}, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {Codes and Provable Security of Ciphers - Extended abstract}, booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, pages = {69--80}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-002-5-69}, doi = {10.3233/978-1-60750-002-5-69}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/DaemenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacrypt/2009, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7}, doi = {10.1007/978-3-642-05445-7}, isbn = {978-3-642-05443-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/natosec/23, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, publisher = {{IOS} Press}, year = {2009}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=12139}, isbn = {978-1-60750-002-5}, timestamp = {Wed, 11 May 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/RijmenBF08, author = {Vincent Rijmen and Paulo S. L. M. Barreto and D{\'{e}}cio Luiz Gazzoni Filho}, title = {Rotation symmetry in algebraically generated cryptographic substitution tables}, journal = {Inf. Process. Lett.}, volume = {106}, number = {6}, pages = {246--250}, year = {2008}, url = {https://doi.org/10.1016/j.ipl.2007.09.012}, doi = {10.1016/J.IPL.2007.09.012}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/RijmenBF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/RechbergerR08, author = {Christian Rechberger and Vincent Rijmen}, title = {New Results on {NMAC/HMAC} when Instantiated with Popular Hash Functions}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {347--376}, year = {2008}, url = {https://doi.org/10.3217/jucs-014-03-0347}, doi = {10.3217/JUCS-014-03-0347}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/RechbergerR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LambergerPRR08, author = {Mario Lamberger and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, title = {Analysis of the Hash Function Design Strategy Called {SMASH}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {8}, pages = {3647--3655}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.926420}, doi = {10.1109/TIT.2008.926420}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/LambergerPRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KasperRBRRS08, author = {Emilia K{\"{a}}sper and Vincent Rijmen and Tor E. Bj{\o}rstad and Christian Rechberger and Matthew J. B. Robshaw and Gautham Sekar}, editor = {Serge Vaudenay}, title = {Correlated Keystreams in Moustique}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {246--257}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_17}, doi = {10.1007/978-3-540-68164-9\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KasperRBRRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NikovaRS08, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {218--234}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_14}, doi = {10.1007/978-3-642-00730-9\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NikovaRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NikovaRS08, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Using Normal Bases for Compact Hardware Implementations of the {AES} S-Box}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {236--245}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_16}, doi = {10.1007/978-3-540-85855-3\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/NikovaRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2008, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5}, doi = {10.1007/978-3-540-89754-5}, isbn = {978-3-540-89753-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isw/2008, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7}, doi = {10.1007/978-3-540-85886-7}, isbn = {978-3-540-85884-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MendelPRR08, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, title = {Analysis of Step-Reduced {SHA-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2008}, url = {http://eprint.iacr.org/2008/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MendelPRR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DaemenR07, author = {Joan Daemen and Vincent Rijmen}, title = {Plateau characteristics}, journal = {{IET} Inf. Secur.}, volume = {1}, number = {1}, pages = {11--17}, year = {2007}, url = {https://doi.org/10.1049/iet-ifs:20060099}, doi = {10.1049/IET-IFS:20060099}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DaemenR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DaemenR07, author = {Joan Daemen and Vincent Rijmen}, title = {Probability distributions of correlation and differentials in block ciphers}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {221--242}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.011}, doi = {10.1515/JMC.2007.011}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DaemenR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PramstallerLR07, author = {Norbert Pramstaller and Mario Lamberger and Vincent Rijmen}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Second Preimages for Iterated Hash Functions and Their Implications on MACs}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {68--81}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_6}, doi = {10.1007/978-3-540-73458-1\_6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PramstallerLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenR07, author = {Lars R. Knudsen and Vincent Rijmen}, editor = {Kaoru Kurosawa}, title = {Known-Key Distinguishers for Some Block Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {315--324}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_19}, doi = {10.1007/978-3-540-76900-2\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MendelR07, author = {Florian Mendel and Vincent Rijmen}, editor = {Kaoru Kurosawa}, title = {Cryptanalysis of the Tiger Hash Function}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {536--550}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_33}, doi = {10.1007/978-3-540-76900-2\_33}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/MendelR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LambergerPRR07, author = {Mario Lamberger and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Masayuki Abe}, title = {Second Preimages for {SMASH}}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {101--111}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_7}, doi = {10.1007/11967668\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LambergerPRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RechbergerR07, author = {Christian Rechberger and Vincent Rijmen}, editor = {Sven Dietrich and Rachna Dhamija}, title = {On Authentication with {HMAC} and Non-random Properties}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {119--133}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_13}, doi = {10.1007/978-3-540-77366-5\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/RechbergerR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelR07, author = {Florian Mendel and Vincent Rijmen}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Colliding Message Pair for 53-Step {HAS-160}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {324--334}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_26}, doi = {10.1007/978-3-540-76788-6\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelR07a, author = {Florian Mendel and Vincent Rijmen}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Weaknesses in the {HAS-V} Compression Function}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {335--345}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_27}, doi = {10.1007/978-3-540-76788-6\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/2007P7021, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, title = {Symmetric Cryptography, 07.01. - 12.01.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07021}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/portals/07021/}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/2007P7021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07, author = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, title = {07021 Executive Summary -- Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 07.01. - 12.01.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07021}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/1020}, timestamp = {Thu, 10 Jun 2021 13:02:05 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BihamHLR07a, author = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, editor = {Eli Biham and Helena Handschuh and Stefan Lucks and Vincent Rijmen}, title = {07021 Abstracts Collection -- Symmetric Cryptography}, booktitle = {Symmetric Cryptography, 07.01. - 12.01.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07021}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2007/1037}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BihamHLR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RechbergerRS06, author = {Christian Rechberger and Vincent Rijmen and Nicolas Sklavos}, title = {The {NIST} Cryptographic Workshop on Hash Functions}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {1}, pages = {54--56}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.26}, doi = {10.1109/MSP.2006.26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/RechbergerRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpga/PramstallerRR06, author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Steven J. E. Wilton and Andr{\'{e}} DeHon}, title = {A compact {FPGA} implementation of the hash function whirlpool}, booktitle = {Proceedings of the {ACM/SIGDA} 14th International Symposium on Field Programmable Gate Arrays, {FPGA} 2006, Monterey, California, USA, February 22-24, 2006}, pages = {159--166}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1117201.1117225}, doi = {10.1145/1117201.1117225}, timestamp = {Tue, 06 Nov 2018 16:58:23 +0100}, biburl = {https://dblp.org/rec/conf/fpga/PramstallerRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPRR06, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Matthew J. B. Robshaw}, title = {Analysis of Step-Reduced {SHA-256}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {126--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_9}, doi = {10.1007/11799313\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MendelPRR06a, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Matthew J. B. Robshaw}, title = {The Impact of Carries on the Complexity of Collision Attacks on {SHA-1}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {278--292}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_18}, doi = {10.1007/11799313\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/MendelPRR06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NikovaRR06, author = {Svetla Nikova and Christian Rechberger and Vincent Rijmen}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Threshold Implementations Against Side-Channel Attacks and Glitches}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {529--545}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_38}, doi = {10.1007/11935308\_38}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/NikovaRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MendelPRYW06, author = {Florian Mendel and Bart Preneel and Vincent Rijmen and Hirotaka Yoshida and Dai Watanabe}, editor = {Rana Barua and Tanja Lange}, title = {Update on Tiger}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {63--79}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_6}, doi = {10.1007/11941378\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/MendelPRYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/MendelPRR06, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {On the Collision Resistance of {RIPEMD-160}}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {101--116}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_8}, doi = {10.1007/11836810\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/MendelPRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DaemenR06, author = {Joan Daemen and Vincent Rijmen}, editor = {Roberto De Prisco and Moti Yung}, title = {Understanding Two-Round Differentials in {AES}}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {78--94}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_6}, doi = {10.1007/11832072\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/DaemenR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenR06, author = {Joan Daemen and Vincent Rijmen}, title = {Two-Round {AES} Differentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2006}, url = {http://eprint.iacr.org/2006/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LambergerPR06, author = {Mario Lamberger and Norbert Pramstaller and Vincent Rijmen}, title = {Second Preimages for Iterated Hash Functions Based on a b-Block Bypass}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {116}, year = {2006}, url = {http://eprint.iacr.org/2006/116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LambergerPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RechbergerR06, author = {Christian Rechberger and Vincent Rijmen}, title = {On Authentication with {HMAC} and Non-Random Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2006}, url = {http://eprint.iacr.org/2006/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RechbergerR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/RijmenO05, author = {Vincent Rijmen and Elisabeth Oswald}, editor = {Alfred Menezes}, title = {Update on {SHA-1}}, booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3376}, pages = {58--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30574-3\_6}, doi = {10.1007/978-3-540-30574-3\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/RijmenO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenR05, author = {Joan Daemen and Vincent Rijmen}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New {MAC} Construction {ALRED} and a Specific Instance {ALPHA-MAC}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {1--17}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_1}, doi = {10.1007/11502760\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OswaldMPR05, author = {Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller and Vincent Rijmen}, editor = {Henri Gilbert and Helena Handschuh}, title = {A Side-Channel Analysis Resistant Description of the {AES} S-Box}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {413--423}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_28}, doi = {10.1007/11502760\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OswaldMPR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/PramstallerRR05, author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Nigel P. Smart}, title = {Exploiting Coding Theory for Collision Attacks on {SHA-1}}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {78--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_7}, doi = {10.1007/11586821\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/PramstallerRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PramstallerRR05, author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Bart Preneel and Stafford E. Tavares}, title = {Breaking a New Hash Function Design Strategy Called {SMASH}}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {233--244}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_16}, doi = {10.1007/11693383\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PramstallerRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PramstallerRR05a, author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Bart Preneel and Stafford E. Tavares}, title = {Impact of Rotations in {SHA-1} and Related Hash Functions}, booktitle = {Selected Areas in Cryptography, 12th International Workshop, {SAC} 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3897}, pages = {261--275}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11693383\_18}, doi = {10.1007/11693383\_18}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PramstallerRR05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/MatusiewiczPPRR05, author = {Krystian Matusiewicz and Josef Pieprzyk and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, editor = {Christopher Wolf and Stefan Lucks and Po{-}Wah Yau}, title = {Analysis of simplified variants of {SHA-256}}, booktitle = {WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium}, series = {{LNI}}, volume = {{P-74}}, pages = {123--134}, publisher = {{GI}}, year = {2005}, url = {https://dl.gi.de/handle/20.500.12116/24844}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/MatusiewiczPPRR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/aes/2004, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137765}, doi = {10.1007/B137765}, isbn = {3-540-26557-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aes/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/DaemenR05, author = {Joan Daemen and Vincent Rijmen}, editor = {Henk C. A. van Tilborg}, title = {Rijndael/AES}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_358}, doi = {10.1007/0-387-23483-7\_358}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/DaemenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RijmenO05, author = {Vincent Rijmen and Elisabeth Oswald}, title = {Update on {SHA-1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2005}, url = {http://eprint.iacr.org/2005/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RijmenO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenR05, author = {Joan Daemen and Vincent Rijmen}, title = {The Pelican {MAC} Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2005}, url = {http://eprint.iacr.org/2005/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenR05a, author = {Joan Daemen and Vincent Rijmen}, title = {Probability distributions of Correlation and Differentials in Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2005}, url = {http://eprint.iacr.org/2005/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenR05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/RijmenO04, author = {Vincent Rijmen and Elisabeth Oswald}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {Representations and Rijndael Descriptions}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {148--158}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_13}, doi = {10.1007/11506447\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aes/RijmenO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ScaveniusBPCR04, author = {Ove Scavenius and Martin Boesgaard and Thomas Pedersen and Jesper Christiansen and Vincent Rijmen}, editor = {Tatsuaki Okamoto}, title = {Periodic Properties of Counter Assisted Stream Ciphers}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {39--53}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_4}, doi = {10.1007/978-3-540-24660-2\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ScaveniusBPCR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BechlaghemR04, author = {Malek Bechlaghem and Vincent Rijmen}, editor = {Chae Hoon Lim and Moti Yung}, title = {Proving Key Usage}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {65--72}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_6}, doi = {10.1007/978-3-540-31815-6\_6}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BechlaghemR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NakaharaRPV03, author = {Jorge Nakahara Jr. and Vincent Rijmen and Bart Preneel and Joos Vandewalle}, editor = {Kijoon Chae and Moti Yung}, title = {The {MESH} Block Ciphers}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {458--473}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_34}, doi = {10.1007/978-3-540-24591-9\_34}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NakaharaRPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/DaemenR02, author = {Joan Daemen and Vincent Rijmen}, title = {The Design of Rijndael: {AES} - The Advanced Encryption Standard}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-662-04722-4}, doi = {10.1007/978-3-662-04722-4}, isbn = {3-540-42580-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/DaemenR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DaemenR02, author = {Joan Daemen and Vincent Rijmen}, editor = {Lars R. Knudsen}, title = {{AES} and the Wide Trail Design Strategy}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {108--109}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_7}, doi = {10.1007/3-540-46035-7\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DaemenR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DaemenR02, author = {Joan Daemen and Vincent Rijmen}, editor = {Alfred Menezes and Palash Sarkar}, title = {Security of a Wide Trail Design}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {1--11}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_1}, doi = {10.1007/3-540-36231-2\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DaemenR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2002, editor = {Joan Daemen and Vincent Rijmen}, title = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9}, doi = {10.1007/3-540-45661-9}, isbn = {3-540-44009-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BorstPR01, author = {Johan Borst and Bart Preneel and Vincent Rijmen}, title = {Cryptography on smart cards}, journal = {Comput. Networks}, volume = {36}, number = {4}, pages = {423--435}, year = {2001}, url = {https://doi.org/10.1016/S1389-1286(01)00164-5}, doi = {10.1016/S1389-1286(01)00164-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BorstPR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DaemenKR01, author = {Joan Daemen and Lars R. Knudsen and Vincent Rijmen}, title = {Linear Frameworks for Block Ciphers}, journal = {Des. Codes Cryptogr.}, volume = {22}, number = {1}, pages = {65--87}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DaemenKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenRPV01, author = {Vincent Rijmen and Bart Van Rompay and Bart Preneel and Joos Vandewalle}, editor = {Mitsuru Matsui}, title = {Producing Collisions for {PANAMA}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {37--51}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_4}, doi = {10.1007/3-540-45473-X\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenRPV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BarretoRNPVK01, author = {Paulo S. L. M. Barreto and Vincent Rijmen and Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle and Hae Yong Kim}, editor = {Mitsuru Matsui}, title = {Improved {SQUARE} Attacks against Reduced-Round {HIEROCRYPT}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {165--173}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_14}, doi = {10.1007/3-540-45473-X\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BarretoRNPVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BihamFMR01, author = {Eli Biham and Vladimir Furman and Michal Misztal and Vincent Rijmen}, editor = {Mitsuru Matsui}, title = {Differential Cryptanalysis of {Q}}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {174--186}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_15}, doi = {10.1007/3-540-45473-X\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BihamFMR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/BarretoKR01, author = {Paulo S. L. M. Barreto and Hae Yong Kim and Vincent Rijmen}, title = {Toward a secure public-key blockwise fragile authentication watermarking}, booktitle = {Proceedings of the 2001 International Conference on Image Processing, {ICIP} 2001, Thessaloniki, Greece, October 7-10, 2001}, pages = {494--497}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICIP.2001.958536}, doi = {10.1109/ICIP.2001.958536}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/BarretoKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DaemenR01, author = {Joan Daemen and Vincent Rijmen}, editor = {Bahram Honary}, title = {The Wide Trail Design Strategy}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {222--238}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_20}, doi = {10.1007/3-540-45325-3\_20}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/DaemenR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/ParkerR01, author = {Matthew Geoffrey Parker and Vincent Rijmen}, editor = {Tor Helleseth and P. Vijay Kumar and Kyeongcheol Yang}, title = {The Quantum Entanglement of Binary and Bipolar Sequences}, booktitle = {Sequences and their Applications - Proceedings of {SETA} 2001, Bergen, Norway, May 13-17, 2001}, series = {Discrete Mathematics and Theoretical Computer Science}, pages = {296--309}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4471-0673-9\_22}, doi = {10.1007/978-1-4471-0673-9\_22}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seta/ParkerR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KnudsenR00, author = {Lars R. Knudsen and Vincent Rijmen}, title = {Ciphertext-only Attack on Akelarre}, journal = {Cryptologia}, volume = {24}, number = {2}, pages = {135--147}, year = {2000}, url = {https://doi.org/10.1080/01611190008984238}, doi = {10.1080/01611190008984238}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KnudsenR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/DaemenR00, author = {Joan Daemen and Vincent Rijmen}, title = {Rijndael for {AES}}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {343--348}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/DaemenR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DHalluinBPR99, author = {Carl D'Halluin and Gert Bijnens and Bart Preneel and Vincent Rijmen}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Equivalent Keys of {HPC}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {29--42}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_4}, doi = {10.1007/978-3-540-48000-6\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DHalluinBPR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DHalluinBRP99, author = {Carl D'Halluin and Gert Bijnens and Vincent Rijmen and Bart Preneel}, editor = {Lars R. Knudsen}, title = {Attack on Six Rounds of Crypton}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {46--59}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_4}, doi = {10.1007/3-540-48519-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DHalluinBRP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenR99, author = {Lars R. Knudsen and Vincent Rijmen}, editor = {Lars R. Knudsen}, title = {On the Decorrelated Fast Cipher {(DFC)} and Its Theory}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {81--94}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_7}, doi = {10.1007/3-540-48519-8\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenR99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcard/RijmenD99, author = {Vincent Rijmen and Joan Daemen}, editor = {Scott B. Guthery and Peter Honeyman}, title = {Efficient Block Ciphers for Smartcards}, booktitle = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, May 10-11, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/efficient-block-ciphers-smartcards}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/smartcard/RijmenD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KnudsenMPRV98, author = {Lars R. Knudsen and Willi Meier and Bart Preneel and Vincent Rijmen and Sven Verdoolaege}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Analysis Methods for (Alleged) {RC4}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {327--341}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_26}, doi = {10.1007/3-540-49649-1\_26}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KnudsenMPRV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DaemenR98, author = {Joan Daemen and Vincent Rijmen}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {The Block Cipher {BKSQ}}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {236--245}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_22}, doi = {10.1007/10721064\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DaemenR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DaemenR98a, author = {Joan Daemen and Vincent Rijmen}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {The Block Cipher Rijndael}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {277--284}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_26}, doi = {10.1007/10721064\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DaemenR98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenRRR98, author = {Lars R. Knudsen and Vincent Rijmen and Ronald L. Rivest and Matthew J. B. Robshaw}, editor = {Serge Vaudenay}, title = {On the Design and Security of {RC2}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {206--221}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_14}, doi = {10.1007/3-540-69710-1\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RompayKR98, author = {Bart Van Rompay and Lars R. Knudsen and Vincent Rijmen}, editor = {Serge Vaudenay}, title = {Differential Cryptanalysis of the {ICE} Encryption Algorithm}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {270--283}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_18}, doi = {10.1007/3-540-69710-1\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RompayKR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HallKRSW98, author = {Chris Hall and John Kelsey and Vincent Rijmen and Bruce Schneier and David A. Wagner}, editor = {Stafford E. Tavares and Henk Meijer}, title = {Cryptanalysis of {SPEED}}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {319--338}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_25}, doi = {10.1007/3-540-48892-8\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HallKRSW98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ac/1997crypto, editor = {Bart Preneel and Vincent Rijmen}, title = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49248-8}, doi = {10.1007/3-540-49248-8}, isbn = {3-540-65474-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ac/1997crypto.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RijmenPW97, author = {Vincent Rijmen and Bart Preneel and Erik De Win}, title = {On Weaknesses of Non-surjective Round Functions}, journal = {Des. Codes Cryptogr.}, volume = {12}, number = {3}, pages = {253--266}, year = {1997}, url = {https://doi.org/10.1023/A:1008224928678}, doi = {10.1023/A:1008224928678}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RijmenPW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/PreneelRO97, author = {Bart Preneel and Vincent Rijmen and Paul C. van Oorschot}, title = {Security analysis of the message authenticator algorithm {(MAA)}}, journal = {Eur. Trans. Telecommun.}, volume = {8}, number = {5}, pages = {455--470}, year = {1997}, url = {https://doi.org/10.1002/ett.4460080504}, doi = {10.1002/ETT.4460080504}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/PreneelRO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/PreneelRB97, author = {Bart Preneel and Vincent Rijmen and Antoon Bosselaers}, editor = {Bart Preneel and Vincent Rijmen}, title = {Recent Developments in the Design of Conventional Cryptographic Algorithms}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {105--130}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_4}, doi = {10.1007/3-540-49248-8\_4}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/PreneelRB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BorstKR97, author = {Johan Borst and Lars R. Knudsen and Vincent Rijmen}, editor = {Walter Fumy}, title = {Two Attacks on Reduced {IDEA}}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {1--13}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_1}, doi = {10.1007/3-540-69053-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BorstKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP97, author = {Vincent Rijmen and Bart Preneel}, editor = {Eli Biham}, title = {A Family of Trapdoor Ciphers}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {139--148}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052342}, doi = {10.1007/BFB0052342}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenKR97, author = {Joan Daemen and Lars R. Knudsen and Vincent Rijmen}, editor = {Eli Biham}, title = {The Block Cipher Square}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {149--165}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052343}, doi = {10.1007/BFB0052343}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenDPBW96, author = {Vincent Rijmen and Joan Daemen and Bart Preneel and Antoon Bosselaers and Erik De Win}, editor = {Dieter Gollmann}, title = {The Cipher {SHARK}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {99--111}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_47}, doi = {10.1007/3-540-60865-6\_47}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP94, author = {Vincent Rijmen and Bart Preneel}, editor = {Bart Preneel}, title = {Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {242--248}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_18}, doi = {10.1007/3-540-60590-8\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenP94a, author = {Vincent Rijmen and Bart Preneel}, editor = {Bart Preneel}, title = {Cryptanalysis of McGuffin}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {353--358}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_27}, doi = {10.1007/3-540-60590-8\_27}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenP94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PreneelNRB93, author = {Bart Preneel and Marnix Nuttin and Vincent Rijmen and Johan Buelens}, editor = {Douglas R. Stinson}, title = {Cryptanalysis of the {CFB} Mode of the {DES} with a Reduced Number of Rounds}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {212--223}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_19}, doi = {10.1007/3-540-48329-2\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PreneelNRB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.