BibTeX records: Joan Daemen

download as .bib file

@article{DBLP:journals/ccds/DaemenKMV24,
  author       = {Joan Daemen and
                  Dani{\"{e}}l Kuijsters and
                  Silvia Mella and
                  Denise Verbakel},
  title        = {Propagation properties of a non-linear mapping based on squaring in
                  odd characteristic},
  journal      = {Cryptogr. Commun.},
  volume       = {16},
  number       = {5},
  pages        = {997--1011},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12095-024-00711-4},
  doi          = {10.1007/S12095-024-00711-4},
  timestamp    = {Tue, 10 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DaemenKMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchooneD24,
  author       = {Jan Schoone and
                  Joan Daemen},
  title        = {The state diagram of {\(\chi\)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {5},
  pages        = {1393--1421},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01349-8},
  doi          = {10.1007/S10623-023-01349-8},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchooneD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchooneD24a,
  author       = {Jan Schoone and
                  Joan Daemen},
  title        = {Algebraic properties of the maps {\(\chi\)} \({}_{\mbox{n}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {8},
  pages        = {2341--2365},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-024-01395-w},
  doi          = {10.1007/S10623-024-01395-W},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchooneD24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arc/AdhikaryBBBDMMPRSSVZ24,
  author       = {Asmita Adhikary and
                  Abraham Basurto and
                  Lejla Batina and
                  Ileana Buhan and
                  Joan Daemen and
                  Silvia Mella and
                  Nele Mentens and
                  Stjepan Picek and
                  Durga Lakshmi Ramachandran and
                  Abolfazl Sajadi and
                  Todor Stefanov and
                  Dennis Vermoen and
                  Nusa Zidaric},
  editor       = {Iouliia Skliarova and
                  Piedad Brox Jim{\'{e}}nez and
                  M{\'{a}}rio P. V{\'{e}}stias and
                  Pedro C. Diniz},
  title        = {{PROACT} - Physical Attack Resistance of Cryptographic Algorithms
                  and Circuits with Reduced Time to Market},
  booktitle    = {Applied Reconfigurable Computing. Architectures, Tools, and Applications
                  - 20th International Symposium, {ARC} 2024, Aveiro, Portugal, March
                  20-22, 2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14553},
  pages        = {255--266},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-55673-9\_18},
  doi          = {10.1007/978-3-031-55673-9\_18},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arc/AdhikaryBBBDMMPRSSVZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AmiriEliasiGD24,
  author       = {Parisa Amiri{-}Eliasi and
                  Koustabh Ghosh and
                  Joan Daemen},
  editor       = {Clemente Galdi and
                  Duong Hieu Phan},
  title        = {Mystrium: Wide Block Encryption Efficient on Entry-Level Processors},
  booktitle    = {Security and Cryptography for Networks - 14th International Conference,
                  {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14974},
  pages        = {71--96},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-71073-5\_4},
  doi          = {10.1007/978-3-031-71073-5\_4},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AmiriEliasiGD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EliasiBDGKMMRA24,
  author       = {Parisa Amiri{-}Eliasi and
                  Yanis Belkheyar and
                  Joan Daemen and
                  Santosh Ghosh and
                  Dani{\"{e}}l Kuijsters and
                  Alireza Mehrdad and
                  Silvia Mella and
                  Shahram Rasoolzadeh and
                  Gilles Van Assche},
  title        = {Koala: {A} Low-Latency Pseudorandom Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1249},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1249},
  timestamp    = {Tue, 17 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EliasiBDGKMMRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/MellaMD23,
  author       = {Silvia Mella and
                  Alireza Mehrdad and
                  Joan Daemen},
  title        = {Differential and Linear properties of vectorial boolean functions
                  based on chi},
  journal      = {Cryptogr. Commun.},
  volume       = {15},
  number       = {6},
  pages        = {1087--1116},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12095-023-00639-1},
  doi          = {10.1007/S12095-023-00639-1},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/MellaMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/BelkheyarDDGR23,
  author       = {Yanis Belkheyar and
                  Joan Daemen and
                  Christoph Dobraunig and
                  Santosh Ghosh and
                  Shahram Rasoolzadeh},
  title        = {BipBip: {A} Low-Latency Tweakable Block Cipher with Small Dimensions},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {1},
  pages        = {326--368},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i1.326-368},
  doi          = {10.46586/TCHES.V2023.I1.326-368},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/BelkheyarDDGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GhoshAD23,
  author       = {Koustabh Ghosh and
                  Parisa Amiri{-}Eliasi and
                  Joan Daemen},
  title        = {Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {3},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i3.1-24},
  doi          = {10.46586/TOSC.V2023.I3.1-24},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GhoshAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MellaDA23,
  author       = {Silvia Mella and
                  Joan Daemen and
                  Gilles Van Assche},
  title        = {Tighter Trail Bounds for Xoodoo},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {187--214},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.187-214},
  doi          = {10.46586/TOSC.V2023.I4.187-214},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MellaDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GhoshFAD23,
  author       = {Koustabh Ghosh and
                  Jonathan Fuchs and
                  Parisa Amiri{-}Eliasi and
                  Joan Daemen},
  editor       = {Nadia El Mrabet and
                  Luca De Feo and
                  Sylvain Duquesne},
  title        = {Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference
                  on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14064},
  pages        = {129--150},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37679-5\_6},
  doi          = {10.1007/978-3-031-37679-5\_6},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GhoshFAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirchDRM23,
  author       = {Solane El Hirch and
                  Joan Daemen and
                  Raghvendra Rohit and
                  Rusydi H. Makarim},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Twin Column Parity Mixers and Gaston - {A} New Mixing Layer and Permutation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {475--506},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_16},
  doi          = {10.1007/978-3-031-38548-3\_16},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirchDRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FuchsRD23,
  author       = {Jonathan Fuchs and
                  Yann Rotella and
                  Joan Daemen},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On the Security of Keyed Hashing Based on Public Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14083},
  pages        = {607--627},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38548-3\_20},
  doi          = {10.1007/978-3-031-38548-3\_20},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FuchsRD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GhoshAD23,
  author       = {Koustabh Ghosh and
                  Parisa Amiri{-}Eliasi and
                  Joan Daemen},
  editor       = {Anupam Chattopadhyay and
                  Shivam Bhasin and
                  Stjepan Picek and
                  Chester Rebeiro},
  title        = {Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication
                  and Cyclic Shift},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference
                  on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14459},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56232-7\_1},
  doi          = {10.1007/978-3-031-56232-7\_1},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GhoshAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/BelliniGRSDH23,
  author       = {Emanuele Bellini and
                  Juan Grados and
                  Mohamed Rachidi and
                  Nitin Satpute and
                  Joan Daemen and
                  Solane El Hirch},
  editor       = {Abdelrahaman Aly and
                  Mehdi Tibouchi},
  title        = {ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations
                  for (High-order) Avalanche Tests},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference
                  on Cryptology and Information Security in Latin America, {LATINCRYPT}
                  2023, Quito, Ecuador, October 3-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14168},
  pages        = {24--43},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44469-2\_2},
  doi          = {10.1007/978-3-031-44469-2\_2},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/latincrypt/BelliniGRSDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchooneD23,
  author       = {Jan Schoone and
                  Joan Daemen},
  title        = {The state diagram of {\(\chi\)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/328},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchooneD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDHPAKV23,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer and
                  Beno{\^{\i}}t Viguier},
  title        = {TurboSHAKE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {342},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/342},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDHPAKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshFAD23,
  author       = {Koustabh Ghosh and
                  Jonathan Fuchs and
                  Parisa Amiri{-}Eliasi and
                  Joan Daemen},
  title        = {Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {696},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/696},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshFAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshD23,
  author       = {Koustabh Ghosh and
                  Joan Daemen},
  title        = {Differential properties of integer multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/737},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirchDRM23,
  author       = {Solane El Hirch and
                  Joan Daemen and
                  Raghvendra Rohit and
                  Rusydi H. Makarim},
  title        = {Twin Column Parity Mixers and Gaston - {A} New Mixing Layer and Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/799},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirchDRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelkheyarDDGR23,
  author       = {Yanis Belkheyar and
                  Joan Daemen and
                  Christoph Dobraunig and
                  Santosh Ghosh and
                  Shahram Rasoolzadeh},
  title        = {Introducing two Low-Latency Cipher Families: Sonic and SuperSonic},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {878},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/878},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BelkheyarDDGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelliniGRSDH23,
  author       = {Emanuele Bellini and
                  Juan Grados and
                  Mohamed Rachidi and
                  Nitin Satpute and
                  Joan Daemen and
                  Solane El Hirch},
  title        = {ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations
                  for High-Order avalanche Tests},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1352},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1352},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BelliniGRSDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhoshAD23,
  author       = {Koustabh Ghosh and
                  Parisa Amiri{-}Eliasi and
                  Joan Daemen},
  title        = {Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1357},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1357},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GhoshAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenMA23,
  author       = {Joan Daemen and
                  Silvia Mella and
                  Gilles Van Assche},
  title        = {Committing authenticated encryption based on {SHAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1494},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1494},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LefevreBD23,
  author       = {Charlotte Lefevre and
                  Yanis Belkheyar and
                  Joan Daemen},
  title        = {Kirby: {A} Robust Permutation-Based {PRF} Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1520},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1520},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LefevreBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchooneD23a,
  author       = {Jan Schoone and
                  Joan Daemen},
  title        = {Algebraic properties of the maps {\(\chi\)}\({}_{\mbox{n}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1708},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1708},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SchooneD23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/SateesanVDM22,
  author       = {Arish Sateesan and
                  Jo Vliegen and
                  Joan Daemen and
                  Nele Mentens},
  title        = {Hardware-oriented optimization of Bloom filter algorithms and architectures
                  for ultra-high-speed lookups in network applications},
  journal      = {Microprocess. Microsystems},
  volume       = {93},
  pages        = {104619},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.micpro.2022.104619},
  doi          = {10.1016/J.MICPRO.2022.104619},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/SateesanVDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MehrdadMGD22,
  author       = {Alireza Mehrdad and
                  Silvia Mella and
                  Lorenzo Grassi and
                  Joan Daemen},
  title        = {Differential Trail Search in Cryptographic Primitives with Big-Circle
                  Chi: Application to Subterranean},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {253--288},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.253-288},
  doi          = {10.46586/TOSC.V2022.I2.253-288},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/MehrdadMGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HirchMMD22,
  author       = {Solane El Hirch and
                  Silvia Mella and
                  Alireza Mehrdad and
                  Joan Daemen},
  title        = {Improved Differential and Linear Trail Bounds for {ASCON}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {145--178},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.145-178},
  doi          = {10.46586/TOSC.V2022.I4.145-178},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/HirchMMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BacuietiDHAK22,
  author       = {Norica Bacuieti and
                  Joan Daemen and
                  Seth Hoffert and
                  Gilles Van Assche and
                  Ronny Van Keer},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Jammin' on the Deck},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {555--584},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_19},
  doi          = {10.1007/978-3-031-22966-4\_19},
  timestamp    = {Fri, 03 Feb 2023 17:07:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BacuietiDHAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/BeckersUVVWDDGM22,
  author       = {Arthur Beckers and
                  Roel Uytterhoeven and
                  Thomas Vandenabeele and
                  Jo Vliegen and
                  Lennert Wouters and
                  Joan Daemen and
                  Wim Dehaene and
                  Benedikt Gierlichs and
                  Nele Mentens},
  editor       = {Luca Sterpone and
                  Andrea Bartolini and
                  Anastasiia Butko},
  title        = {Energy and side-channel security evaluation of near-threshold cryptographic
                  circuits in 28nm {FD-SOI} technology},
  booktitle    = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers,
                  Turin, Italy, May 17 - 22, 2022},
  pages        = {258--262},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3528416.3530992},
  doi          = {10.1145/3528416.3530992},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/BeckersUVVWDDGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/KuijstersVD22,
  author       = {Dani{\"{e}}l Kuijsters and
                  Denise Verbakel and
                  Joan Daemen},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {Weak Subtweakeys in {SKINNY}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {336--348},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_15},
  doi          = {10.1007/978-3-031-22912-1\_15},
  timestamp    = {Mon, 09 Jan 2023 17:58:33 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/KuijstersVD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2022,
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9},
  doi          = {10.1007/978-3-031-17433-9},
  isbn         = {978-3-031-17433-9},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GunsingDM22,
  author       = {Aldo Gunsing and
                  Joan Daemen and
                  Bart Mennink},
  title        = {Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded
                  Keyed Hashing Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/247},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GunsingDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BacuietiDHAK22,
  author       = {Norica Bacuieti and
                  Joan Daemen and
                  Seth Hoffert and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Jammin' on the deck},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/531},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BacuietiDHAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuijstersVD22,
  author       = {Dani{\"{e}}l Kuijsters and
                  Denise Verbakel and
                  Joan Daemen},
  title        = {Weak Subtweakeys in {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1042},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1042},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuijstersVD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenMA22,
  author       = {Joan Daemen and
                  Silvia Mella and
                  Gilles Van Assche},
  title        = {Tighter trail bounds for Xoodoo},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1088},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuchsRD22,
  author       = {Jonathan Fuchs and
                  Yann Rotella and
                  Joan Daemen},
  title        = {On the security of keyed hashing based on an unkeyed block function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1172},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1172},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuchsRD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirchMMD22,
  author       = {Solane El Hirch and
                  Silvia Mella and
                  Alireza Mehrdad and
                  Joan Daemen},
  title        = {Improved Differential and Linear Trail Bounds for {ASCON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1377},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1377},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HirchMMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BordesDKA21,
  author       = {Nicolas Bordes and
                  Joan Daemen and
                  Dani{\"{e}}l Kuijsters and
                  Gilles Van Assche},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Thinking Outside the Superbox},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {337--367},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_12},
  doi          = {10.1007/978-3-030-84252-9\_12},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BordesDKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/samos/MiteloudiBDM21,
  author       = {Konstantina Miteloudi and
                  Lejla Batina and
                  Joan Daemen and
                  Nele Mentens},
  editor       = {Alex Orailoglu and
                  Matthias Jung and
                  Marc Reichenbach},
  title        = {{ROCKY:} Rotation Countermeasure for the Protection of Keys and Other
                  Sensitive Data},
  booktitle    = {Embedded Computer Systems: Architectures, Modeling, and Simulation
                  - 21st International Conference, {SAMOS} 2021, Virtual Event, July
                  4-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13227},
  pages        = {288--299},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-04580-6\_19},
  doi          = {10.1007/978-3-031-04580-6\_19},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/samos/MiteloudiBDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/DaemenMM21,
  author       = {Joan Daemen and
                  Alireza Mehrdad and
                  Silvia Mella},
  editor       = {Lejla Batina and
                  Stjepan Picek and
                  Mainack Mondal},
  title        = {Computing the Distribution of Differentials over the Non-linear Mapping
                  {\(\chi\)}},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 11th International
                  Conference, {SPACE} 2021, Kolkata, India, December 10-13, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13162},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95085-9\_1},
  doi          = {10.1007/978-3-030-95085-9\_1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/DaemenMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BordesDKA21,
  author       = {Nicolas Bordes and
                  Joan Daemen and
                  Dani{\"{e}}l Kuijsters and
                  Gilles Van Assche},
  title        = {Thinking Outside the Superbox},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {293},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/293},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BordesDKA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/isc/DaemenR20,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Design of Rijndael - The Advanced Encryption Standard (AES), Second
                  Edition},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-662-60769-5},
  doi          = {10.1007/978-3-662-60769-5},
  isbn         = {978-3-662-60768-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/isc/DaemenR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/DaemenDEGMP20,
  author       = {Joan Daemen and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Florian Mendel and
                  Robert Primas},
  title        = {Protecting against Statistical Ineffective Fault Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2020},
  number       = {3},
  pages        = {508--543},
  year         = {2020},
  url          = {https://doi.org/10.13154/tches.v2020.i3.508-543},
  doi          = {10.13154/TCHES.V2020.I3.508-543},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GunsingDM20,
  author       = {Aldo Gunsing and
                  Joan Daemen and
                  Bart Mennink},
  title        = {Errata to Sound Hashing Modes of Arbitrary Functions, Permutations,
                  and Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {362--366},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.362-366},
  doi          = {10.13154/TOSC.V2020.I3.362-366},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GunsingDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenHPAK20,
  author       = {Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Xoodyak, a lightweight cryptographic scheme},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {60--87},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.60-87},
  doi          = {10.13154/TOSC.V2020.IS1.60-87},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenHPAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenMMR20,
  author       = {Joan Daemen and
                  Pedro Maat Costa Massolino and
                  Alireza Mehrdad and
                  Yann Rotella},
  title        = {The Subterranean 2.0 Cipher Suite},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {{S1}},
  pages        = {262--294},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.iS1.262-294},
  doi          = {10.13154/TOSC.V2020.IS1.262-294},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenMMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/RoelofsSBD20,
  author       = {Niels Roelofs and
                  Niels Samwel and
                  Lejla Batina and
                  Joan Daemen},
  editor       = {Abderrahmane Nitaj and
                  Amr M. Youssef},
  title        = {Online Template Attack on {ECDSA:} - Extracting Keys via the Other
                  Side},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
                  on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12174},
  pages        = {323--336},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51938-4\_16},
  doi          = {10.1007/978-3-030-51938-4\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/RoelofsSBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/SateesanVDM20,
  author       = {Arish Sateesan and
                  Jo Vliegen and
                  Joan Daemen and
                  Nele Mentens},
  title        = {Novel Bloom filter algorithms and architectures for ultra-high-speed
                  network security applications},
  booktitle    = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj,
                  Slovenia, August 26-28, 2020},
  pages        = {262--269},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/DSD51259.2020.00050},
  doi          = {10.1109/DSD51259.2020.00050},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsd/SateesanVDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SimonBDGMP0S20,
  author       = {Thierry Simon and
                  Lejla Batina and
                  Joan Daemen and
                  Vincent Grosso and
                  Pedro Maat Costa Massolino and
                  Kostas Papagiannopoulos and
                  Francesco Regazzoni and
                  Niels Samwel},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {581--611},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_21},
  doi          = {10.1007/978-3-030-45721-1\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SimonBDGMP0S20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimonBDGMPRS20,
  author       = {Thierry Simon and
                  Lejla Batina and
                  Joan Daemen and
                  Vincent Grosso and
                  Pedro Maat Costa Massolino and
                  Kostas Papagiannopoulos and
                  Francesco Regazzoni and
                  Niels Samwel},
  title        = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {425},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/425},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GunsingDM19,
  author       = {Aldo Gunsing and
                  Joan Daemen and
                  Bart Mennink},
  title        = {Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded
                  Keyed Hashing Model},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {1--22},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.1-22},
  doi          = {10.13154/TOSC.V2019.I4.1-22},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/GunsingDM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenDEGMP19,
  author       = {Joan Daemen and
                  Christoph Dobraunig and
                  Maria Eichlseder and
                  Hannes Gro{\ss} and
                  Florian Mendel and
                  Robert Primas},
  title        = {Protecting against Statistical Ineffective Fault Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenDEGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/StoffelenD18,
  author       = {Ko Stoffelen and
                  Joan Daemen},
  title        = {Column Parity Mixers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {126--159},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.126-159},
  doi          = {10.13154/TOSC.V2018.I1.126-159},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/StoffelenD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenHAK18,
  author       = {Joan Daemen and
                  Seth Hoffert and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {The design of Xoodoo and Xoofff},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {1--38},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.1-38},
  doi          = {10.13154/TOSC.V2018.I4.1-38},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenHAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/DaemenMA18,
  author       = {Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  title        = {Sound Hashing Modes of Arbitrary Functions, Permutations, and Block
                  Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {4},
  pages        = {197--228},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i4.197-228},
  doi          = {10.13154/TOSC.V2018.I4.197-228},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/DaemenMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BertoniDPAKV18,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer and
                  Beno{\^{\i}}t Viguier},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {KangarooTwelve: Fast Hashing Based on Keccak-p},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {400--418},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_21},
  doi          = {10.1007/978-3-319-93387-0\_21},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BertoniDPAKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18,
  author       = {Niels Samwel and
                  Lejla Batina and
                  Guido Bertoni and
                  Joan Daemen and
                  Ruggero Susella},
  editor       = {Nigel P. Smart},
  title        = {Breaking Ed25519 in WolfSSL},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_1},
  doi          = {10.1007/978-3-319-76953-0\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/DaemenILN18,
  author       = {Joan Daemen and
                  Tetsu Iwata and
                  Nils Gregor Leander and
                  Kaisa Nyberg},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 18021)},
  journal      = {Dagstuhl Reports},
  volume       = {8},
  number       = {1},
  pages        = {1--32},
  year         = {2018},
  url          = {https://doi.org/10.4230/DagRep.8.1.1},
  doi          = {10.4230/DAGREP.8.1.1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/DaemenILN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenHAK18,
  author       = {Joan Daemen and
                  Seth Hoffert and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Xoodoo cookbook},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenHAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDHPAK18,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDHPAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MellaDA17,
  author       = {Silvia Mella and
                  Joan Daemen and
                  Gilles Van Assche},
  title        = {New techniques for trail bounds and application to differential trails
                  in Keccak},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {329--357},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.329-357},
  doi          = {10.13154/TOSC.V2017.I1.329-357},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MellaDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BertoniDHPAK17,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Seth Hoffert and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Farfalle: parallel permutation-based cryptography},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {4},
  pages        = {1--38},
  year         = {2017},
  url          = {https://tosc.iacr.org/index.php/ToSC/article/view/801},
  timestamp    = {Mon, 08 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BertoniDHPAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DaemenMA17,
  author       = {Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Full-State Keyed Duplex with Built-In Multi-user Support},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  pages        = {606--637},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9\_21},
  doi          = {10.1007/978-3-319-70697-9\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DaemenMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/SamwelD17,
  author       = {Niels Samwel and
                  Joan Daemen},
  title        = {{DPA} on hardware implementations of Ascon and Keyak},
  booktitle    = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy,
                  May 15-17, 2017},
  pages        = {415--424},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3075564.3079067},
  doi          = {10.1145/3075564.3079067},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/SamwelD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Daemen17,
  author       = {Joan Daemen},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Changing of the Guards: {A} Simple and Efficient Method for Achieving
                  Uniformity in Threshold Sharing},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_7},
  doi          = {10.1007/978-3-319-66787-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Daemen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MellaDA17,
  author       = {Silvia Mella and
                  Joan Daemen and
                  Gilles Van Assche},
  title        = {New techniques for trail bounds and application to differential trails
                  in Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MellaDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenMA17,
  author       = {Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  title        = {Full-State Keyed Duplex With Built-In Multi-User Support},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {498},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamwelBBDS17,
  author       = {Niels Samwel and
                  Lejla Batina and
                  Guido Bertoni and
                  Joan Daemen and
                  Ruggero Susella},
  title        = {Breaking Ed25519 in WolfSSL},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {985},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/985},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Daemen16,
  author       = {Joan Daemen},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {On Non-uniformity in Threshold Sharings},
  booktitle    = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  pages        = {41},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366.2996374},
  doi          = {10.1145/2996366.2996374},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Daemen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fpl/WinderickxDM16,
  author       = {Jori Winderickx and
                  Joan Daemen and
                  Nele Mentens},
  editor       = {Paolo Ienne and
                  Walid A. Najjar and
                  Jason Helge Anderson and
                  Philip Brisk and
                  Walter Stechele},
  title        = {Exploring the use of shift register lookup tables for Keccak implementations
                  on Xilinx FPGAs},
  booktitle    = {26th International Conference on Field Programmable Logic and Applications,
                  {FPL} 2016, Lausanne, Switzerland, August 29 - September 2, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/FPL.2016.7577367},
  doi          = {10.1109/FPL.2016.7577367},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fpl/WinderickxDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/Daemen16,
  author       = {Joan Daemen},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Spectral Characterization of Iterating Lossy Mappings},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {159--178},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_9},
  doi          = {10.1007/978-3-319-49445-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/space/Daemen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Daemen16,
  author       = {Joan Daemen},
  title        = {Spectral characterization of iterating lossy mappings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Daemen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPAK16,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {KangarooTwelve: fast hashing based on Keccak-p},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {770},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/770},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Daemen16a,
  author       = {Joan Daemen},
  title        = {Changing of the Guards: a simple and efficient method for achieving
                  uniformity in threshold sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1061},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1061},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Daemen16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPAK16a,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche and
                  Ronny Van Keer},
  title        = {Farfalle: parallel permutation-based cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPAK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaDMA15,
  author       = {Elena Andreeva and
                  Joan Daemen and
                  Bart Mennink and
                  Gilles Van Assche},
  editor       = {Gregor Leander},
  title        = {Security of Keyed Sponge Constructions Using a Modular Proof Approach},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {364--384},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_18},
  doi          = {10.1007/978-3-662-48116-5\_18},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndreevaDMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA15,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {389},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/389},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BertoniDPA14,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {The Making of {KECCAK}},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {26--60},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.856818},
  doi          = {10.1080/01611194.2013.856818},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BertoniDPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BertoniDPA14,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Sufficient conditions for sound tree and sequential hashing modes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {4},
  pages        = {335--353},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0220-y},
  doi          = {10.1007/S10207-013-0220-Y},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/BertoniDPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BertoniDPA14,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Sakura: {A} Flexible Coding for Tree Hashing},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {217--234},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_14},
  doi          = {10.1007/978-3-319-07536-5\_14},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/BertoniDPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BilginDNNRA13,
  author       = {Beg{\"{u}}l Bilgin and
                  Joan Daemen and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen and
                  Gilles Van Assche},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Efficient and First-Order {DPA} Resistant Implementations of Keccak},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_13},
  doi          = {10.1007/978-3-319-08302-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BilginDNNRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA13,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Keccak},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {313--314},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_19},
  doi          = {10.1007/978-3-642-38348-9\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDDLPA13,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Nicolas Debande and
                  Thanh{-}Ha Le and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Power Analysis of Hardware Implementations Protected with Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {67},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/067},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDDLPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA13,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Sakura: a flexible coding for tree hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {231},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/231},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenA12,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  editor       = {Anne Canteaut},
  title        = {Differential Propagation Analysis of Keccak},
  booktitle    = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
                  Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7549},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34047-5\_24},
  doi          = {10.1007/978-3-642-34047-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/BertoniDDLPA12,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Nicolas Debande and
                  Thanh{-}Ha Le and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Power analysis of hardware implementations protected with secret sharing},
  booktitle    = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture,
                  {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December
                  1-5, 2012},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MICROW.2012.12},
  doi          = {10.1109/MICROW.2012.12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/BertoniDDLPA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenA12,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  title        = {Differential propagation analysis of Keccak},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BertoniDPA11,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {Duplexing the Sponge: Single-Pass Authenticated Encryption and Other
                  Applications},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {320--337},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_19},
  doi          = {10.1007/978-3-642-28496-0\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BertoniDPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/DaemenR11,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Rijndael},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1046--1049},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_611},
  doi          = {10.1007/978-1-4419-5906-5\_611},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/DaemenR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenDA11,
  author       = {Joan Daemen and
                  Tony Dusenge and
                  Gilles Van Assche},
  title        = {Sufficient conditions for sound hashing using a truncated permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenDA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA11,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Duplexing the sponge: single-pass authenticated encryption and other
                  applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/DaemenR10,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The First 10 Years of Advanced Encryption},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {6},
  pages        = {72--74},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.193},
  doi          = {10.1109/MSP.2010.193},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/DaemenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DaemenR10,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Refinements of the {ALRED} construction and {MAC} security claims},
  journal      = {{IET} Inf. Secur.},
  volume       = {4},
  number       = {3},
  pages        = {149--157},
  year         = {2010},
  url          = {https://doi.org/10.1049/iet-ifs.2010.0015},
  doi          = {10.1049/IET-IFS.2010.0015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DaemenR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BertoniDPA10,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Sponge-Based Pseudo-Random Number Generators},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_3},
  doi          = {10.1007/978-3-642-15031-9\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/BertoniDPA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/DaemenR09,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {New criteria for linear maps in AES-like ciphers},
  journal      = {Cryptogr. Commun.},
  volume       = {1},
  number       = {1},
  pages        = {47--69},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12095-008-0003-x},
  doi          = {10.1007/S12095-008-0003-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DaemenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/DaemenLPRV09,
  author       = {Joan Daemen and
                  Mario Lamberger and
                  Norbert Pramstaller and
                  Vincent Rijmen and
                  Frederik Vercauteren},
  title        = {Computational aspects of the expected differential probability of
                  4-round {AES} and AES-like ciphers},
  journal      = {Computing},
  volume       = {85},
  number       = {1-2},
  pages        = {85--104},
  year         = {2009},
  url          = {https://doi.org/10.1007/s00607-009-0034-y},
  doi          = {10.1007/S00607-009-0034-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/DaemenLPRV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/DaemenR09,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {Codes and Provable Security of Ciphers - Extended abstract},
  booktitle    = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  pages        = {69--80},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-002-5-69},
  doi          = {10.3233/978-1-60750-002-5-69},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/DaemenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Sufficient conditions for sound tree hashing modes},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1946/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09a,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {The Road from Panama to Keccak via RadioGat{\'{u}}n},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1958/},
  timestamp    = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA09,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {Sufficient conditions for sound tree and sequential hashing modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA08,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Nigel P. Smart},
  title        = {On the Indifferentiability of the Sponge Construction},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_11},
  doi          = {10.1007/978-3-540-78967-3\_11},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/DaemenK08,
  author       = {Joan Daemen and
                  Paris Kitsos},
  editor       = {Matthew J. B. Robshaw and
                  Olivier Billet},
  title        = {The Self-synchronizing Stream Cipher Moustique},
  booktitle    = {New Stream Cipher Designs - The eSTREAM Finalists},
  series       = {Lecture Notes in Computer Science},
  volume       = {4986},
  pages        = {210--223},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68351-3\_16},
  doi          = {10.1007/978-3-540-68351-3\_16},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/DaemenK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/DaemenR07,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Plateau characteristics},
  journal      = {{IET} Inf. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {11--17},
  year         = {2007},
  url          = {https://doi.org/10.1049/iet-ifs:20060099},
  doi          = {10.1049/IET-IFS:20060099},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/DaemenR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/DaemenR07,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Probability distributions of correlation and differentials in block
                  ciphers},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {221--242},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.011},
  doi          = {10.1515/JMC.2007.011},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/DaemenR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenA07,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  editor       = {Alex Biryukov},
  title        = {Producing Collisions for Panama, Instantaneously},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_1},
  doi          = {10.1007/978-3-540-74619-5\_1},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DaemenR06,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Understanding Two-Round Differentials in {AES}},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {78--94},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_6},
  doi          = {10.1007/11832072\_6},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DaemenR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/DaemenA06,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Distinguishing Stream Ciphers with Convolutional Filters},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {257--270},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_18},
  doi          = {10.1007/11832072\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/DaemenA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenR06,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Two-Round {AES} Differentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BertoniDPA06,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {RadioGat{\'{u}}n, a belt-and-mill hash function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BertoniDPA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenR05,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A New {MAC} Construction {ALRED} and a Specific Instance {ALPHA-MAC}},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_1},
  doi          = {10.1007/11502760\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/DaemenR05,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Henk C. A. van Tilborg},
  title        = {Rijndael/AES},
  booktitle    = {Encyclopedia of Cryptography and Security},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/0-387-23483-7\_358},
  doi          = {10.1007/0-387-23483-7\_358},
  timestamp    = {Thu, 27 Jun 2019 15:50:13 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/DaemenR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenA05,
  author       = {Joan Daemen and
                  Gilles Van Assche},
  title        = {Distinguishing Stream Ciphers with Convolutional Filters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenR05,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Pelican {MAC} Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaemenR05a,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Probability distributions of Correlation and Differentials in Block
                  Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaemenR05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/DaemenR02,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {The Design of Rijndael: {AES} - The Advanced Encryption Standard},
  series       = {Information Security and Cryptography},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-662-04722-4},
  doi          = {10.1007/978-3-662-04722-4},
  isbn         = {3-540-42580-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/DaemenR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DaemenR02,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Lars R. Knudsen},
  title        = {{AES} and the Wide Trail Design Strategy},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {108--109},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_7},
  doi          = {10.1007/3-540-46035-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DaemenR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DaemenR02,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Security of a Wide Trail Design},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_1},
  doi          = {10.1007/3-540-36231-2\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DaemenR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2002,
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9},
  doi          = {10.1007/3-540-45661-9},
  isbn         = {3-540-44009-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DaemenKR01,
  author       = {Joan Daemen and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  title        = {Linear Frameworks for Block Ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {22},
  number       = {1},
  pages        = {65--87},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DaemenKR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/DaemenR01,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Bahram Honary},
  title        = {The Wide Trail Design Strategy},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {222--238},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_20},
  doi          = {10.1007/3-540-45325-3\_20},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/DaemenR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aes/DaemenR00,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Rijndael for {AES}},
  booktitle    = {The Third Advanced Encryption Standard Candidate Conference, April
                  13-14, 2000, New York, New York, {USA}},
  pages        = {343--348},
  publisher    = {National Institute of Standards and Technology,},
  year         = {2000},
  timestamp    = {Thu, 08 Aug 2019 17:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/aes/DaemenR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenPA00,
  author       = {Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  editor       = {Bruce Schneier},
  title        = {Bitslice Ciphers and Power Analysis Attacks},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {134--149},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_10},
  doi          = {10.1007/3-540-44706-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenPA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcard/RijmenD99,
  author       = {Vincent Rijmen and
                  Joan Daemen},
  editor       = {Scott B. Guthery and
                  Peter Honeyman},
  title        = {Efficient Block Ciphers for Smartcards},
  booktitle    = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard
                  1999, Chicago, Illinois, USA, May 10-11, 1999},
  publisher    = {{USENIX} Association},
  year         = {1999},
  url          = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/efficient-block-ciphers-smartcards},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcard/RijmenD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DawirsD98,
  author       = {Michel Dawirs and
                  Joan Daemen},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {The Banksys Signature Transport {(BST)} Protocol},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {43--51},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_4},
  doi          = {10.1007/10721064\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DawirsD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DaemenR98,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {The Block Cipher {BKSQ}},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {236--245},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_22},
  doi          = {10.1007/10721064\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DaemenR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DaemenR98a,
  author       = {Joan Daemen and
                  Vincent Rijmen},
  editor       = {Jean{-}Jacques Quisquater and
                  Bruce Schneier},
  title        = {The Block Cipher Rijndael},
  booktitle    = {Smart Card Research and Applications, This International Conference,
                  {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1820},
  pages        = {277--284},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/10721064\_26},
  doi          = {10.1007/10721064\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DaemenR98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenC98,
  author       = {Joan Daemen and
                  Craig S. K. Clapp},
  editor       = {Serge Vaudenay},
  title        = {Fast Hashing and Stream Encryption with {PANAMA}},
  booktitle    = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris,
                  France, March 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1372},
  pages        = {60--74},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-69710-1\_5},
  doi          = {10.1007/3-540-69710-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ac/Daemen97,
  author       = {Joan Daemen},
  editor       = {Bart Preneel and
                  Vincent Rijmen},
  title        = {Management of Secret Keys: Dynamic Key Handling},
  booktitle    = {State of the Art in Applied Cryptography, Course on Computer Security
                  and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised
                  Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {1528},
  pages        = {264--276},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-49248-8\_12},
  doi          = {10.1007/3-540-49248-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ac/Daemen97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenKR97,
  author       = {Joan Daemen and
                  Lars R. Knudsen and
                  Vincent Rijmen},
  editor       = {Eli Biham},
  title        = {The Block Cipher Square},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052343},
  doi          = {10.1007/BFB0052343},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenKR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenDPBW96,
  author       = {Vincent Rijmen and
                  Joan Daemen and
                  Bart Preneel and
                  Antoon Bosselaers and
                  Erik De Win},
  editor       = {Dieter Gollmann},
  title        = {The Cipher {SHARK}},
  booktitle    = {Fast Software Encryption, Third International Workshop, Cambridge,
                  UK, February 21-23, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1039},
  pages        = {99--111},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-60865-6\_47},
  doi          = {10.1007/3-540-60865-6\_47},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenGV94,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Bart Preneel},
  title        = {Correlation Matrices},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {275--285},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_21},
  doi          = {10.1007/3-540-60590-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenGV94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DaemenGV93,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Douglas R. Stinson},
  title        = {Weak Keys for {IDEA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {224--231},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_20},
  doi          = {10.1007/3-540-48329-2\_20},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DaemenGV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DaemenGV93,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Tor Helleseth},
  title        = {Resynchronization Weaknesses in Synchronous Stream Ciphers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {159--167},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_14},
  doi          = {10.1007/3-540-48285-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DaemenGV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/DaemenGV93,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Ross J. Anderson},
  title        = {A New Approach to Block Cipher Design},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_2},
  doi          = {10.1007/3-540-58108-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/DaemenGV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/ClaesenDGP93,
  author       = {Luc J. M. Claesen and
                  Joan Daemen and
                  Mark Genoe and
                  G. Peeters},
  title        = {Subterranean: {A} 600 Mbit/Sec Cryptographic {VLSI} Chip},
  booktitle    = {Proceedings 1993 International Conference on Computer Design: {VLSI}
                  in Computers {\&} Processors, {ICCD} '93, Cambridge, MA, USA,
                  October 3-6, 1993},
  pages        = {610--613},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/ICCD.1993.393304},
  doi          = {10.1109/ICCD.1993.393304},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/ClaesenDGP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DaemenGV92,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Yves Deswarte and
                  G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  title        = {A Hardware Design Model for Cryptographic Algorithms},
  booktitle    = {Computer Security - {ESORICS} 92, Second European Symposium on Research
                  in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {648},
  pages        = {419--434},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013911},
  doi          = {10.1007/BFB0013911},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DaemenGV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DaemenGV91,
  author       = {Joan Daemen and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {A Framework for the Design of One-Way Hash Functions Including Cryptanalysis
                  of Damg{\aa}rd's One-Way Function Based on a Cellular Automaton},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {82--96},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_7},
  doi          = {10.1007/3-540-57332-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DaemenGV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DaemenBGV91,
  author       = {Joan Daemen and
                  Antoon Bosselaers and
                  Ren{\'{e}} Govaerts and
                  Joos Vandewalle},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto
                  '91},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {477--480},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_41},
  doi          = {10.1007/3-540-57332-1\_41},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DaemenBGV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Daemen91,
  author       = {Joan Daemen},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Limitations of the Even-Mansour Construction},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {495--498},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_46},
  doi          = {10.1007/3-540-57332-1\_46},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Daemen91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kivs/HegerWND85,
  author       = {Dirk Heger and
                  Kym Watson and
                  I. G. Niemeggers and
                  Joan Daemen},
  editor       = {Dirk Heger and
                  Gerhard Kr{\"{u}}ger and
                  Otto Spaniol and
                  Werner Zorn},
  title        = {Performance Analysis of Local Area Networks for Real Time Environments},
  booktitle    = {Kommunikation in Verteilten Systemen II, Anwendungen, Betrieb, Grundlagen,
                  GI/ITG-Fachtagung, Karlsruhe, 13.-15. M{\"{a}}rz 1985, Proceedings},
  series       = {Informatik-Fachberichte},
  volume       = {111},
  pages        = {91--107},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/978-3-642-70836-7\_7},
  doi          = {10.1007/978-3-642-70836-7\_7},
  timestamp    = {Tue, 23 May 2017 01:06:28 +0200},
  biburl       = {https://dblp.org/rec/conf/kivs/HegerWND85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}