default search action
BibTeX records: Joan Daemen
@article{DBLP:journals/ccds/DaemenKMV24, author = {Joan Daemen and Dani{\"{e}}l Kuijsters and Silvia Mella and Denise Verbakel}, title = {Propagation properties of a non-linear mapping based on squaring in odd characteristic}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {997--1011}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00711-4}, doi = {10.1007/S12095-024-00711-4}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DaemenKMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchooneD24, author = {Jan Schoone and Joan Daemen}, title = {The state diagram of {\(\chi\)}}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {5}, pages = {1393--1421}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01349-8}, doi = {10.1007/S10623-023-01349-8}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchooneD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchooneD24a, author = {Jan Schoone and Joan Daemen}, title = {Algebraic properties of the maps {\(\chi\)} \({}_{\mbox{n}}\)}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {8}, pages = {2341--2365}, year = {2024}, url = {https://doi.org/10.1007/s10623-024-01395-w}, doi = {10.1007/S10623-024-01395-W}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchooneD24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arc/AdhikaryBBBDMMPRSSVZ24, author = {Asmita Adhikary and Abraham Basurto and Lejla Batina and Ileana Buhan and Joan Daemen and Silvia Mella and Nele Mentens and Stjepan Picek and Durga Lakshmi Ramachandran and Abolfazl Sajadi and Todor Stefanov and Dennis Vermoen and Nusa Zidaric}, editor = {Iouliia Skliarova and Piedad Brox Jim{\'{e}}nez and M{\'{a}}rio P. V{\'{e}}stias and Pedro C. Diniz}, title = {{PROACT} - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market}, booktitle = {Applied Reconfigurable Computing. Architectures, Tools, and Applications - 20th International Symposium, {ARC} 2024, Aveiro, Portugal, March 20-22, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14553}, pages = {255--266}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-55673-9\_18}, doi = {10.1007/978-3-031-55673-9\_18}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arc/AdhikaryBBBDMMPRSSVZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AmiriEliasiGD24, author = {Parisa Amiri{-}Eliasi and Koustabh Ghosh and Joan Daemen}, editor = {Clemente Galdi and Duong Hieu Phan}, title = {Mystrium: Wide Block Encryption Efficient on Entry-Level Processors}, booktitle = {Security and Cryptography for Networks - 14th International Conference, {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14974}, pages = {71--96}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-71073-5\_4}, doi = {10.1007/978-3-031-71073-5\_4}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AmiriEliasiGD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EliasiBDGKMMRA24, author = {Parisa Amiri{-}Eliasi and Yanis Belkheyar and Joan Daemen and Santosh Ghosh and Dani{\"{e}}l Kuijsters and Alireza Mehrdad and Silvia Mella and Shahram Rasoolzadeh and Gilles Van Assche}, title = {Koala: {A} Low-Latency Pseudorandom Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1249}, year = {2024}, url = {https://eprint.iacr.org/2024/1249}, timestamp = {Tue, 17 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EliasiBDGKMMRA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MellaMD23, author = {Silvia Mella and Alireza Mehrdad and Joan Daemen}, title = {Differential and Linear properties of vectorial boolean functions based on chi}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1087--1116}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00639-1}, doi = {10.1007/S12095-023-00639-1}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/MellaMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/BelkheyarDDGR23, author = {Yanis Belkheyar and Joan Daemen and Christoph Dobraunig and Santosh Ghosh and Shahram Rasoolzadeh}, title = {BipBip: {A} Low-Latency Tweakable Block Cipher with Small Dimensions}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {326--368}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i1.326-368}, doi = {10.46586/TCHES.V2023.I1.326-368}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/BelkheyarDDGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GhoshAD23, author = {Koustabh Ghosh and Parisa Amiri{-}Eliasi and Joan Daemen}, title = {Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {3}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i3.1-24}, doi = {10.46586/TOSC.V2023.I3.1-24}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GhoshAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MellaDA23, author = {Silvia Mella and Joan Daemen and Gilles Van Assche}, title = {Tighter Trail Bounds for Xoodoo}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {187--214}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.187-214}, doi = {10.46586/TOSC.V2023.I4.187-214}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MellaDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GhoshFAD23, author = {Koustabh Ghosh and Jonathan Fuchs and Parisa Amiri{-}Eliasi and Joan Daemen}, editor = {Nadia El Mrabet and Luca De Feo and Sylvain Duquesne}, title = {Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2023 - 14th International Conference on Cryptology in Africa, Sousse, Tunisia, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14064}, pages = {129--150}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37679-5\_6}, doi = {10.1007/978-3-031-37679-5\_6}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GhoshFAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirchDRM23, author = {Solane El Hirch and Joan Daemen and Raghvendra Rohit and Rusydi H. Makarim}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Twin Column Parity Mixers and Gaston - {A} New Mixing Layer and Permutation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {475--506}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_16}, doi = {10.1007/978-3-031-38548-3\_16}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirchDRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FuchsRD23, author = {Jonathan Fuchs and Yann Rotella and Joan Daemen}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On the Security of Keyed Hashing Based on Public Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14083}, pages = {607--627}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38548-3\_20}, doi = {10.1007/978-3-031-38548-3\_20}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FuchsRD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GhoshAD23, author = {Koustabh Ghosh and Parisa Amiri{-}Eliasi and Joan Daemen}, editor = {Anupam Chattopadhyay and Shivam Bhasin and Stjepan Picek and Chester Rebeiro}, title = {Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14459}, pages = {3--24}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56232-7\_1}, doi = {10.1007/978-3-031-56232-7\_1}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GhoshAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/BelliniGRSDH23, author = {Emanuele Bellini and Juan Grados and Mohamed Rachidi and Nitin Satpute and Joan Daemen and Solane El Hirch}, editor = {Abdelrahaman Aly and Mehdi Tibouchi}, title = {ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for (High-order) Avalanche Tests}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference on Cryptology and Information Security in Latin America, {LATINCRYPT} 2023, Quito, Ecuador, October 3-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14168}, pages = {24--43}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44469-2\_2}, doi = {10.1007/978-3-031-44469-2\_2}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/latincrypt/BelliniGRSDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchooneD23, author = {Jan Schoone and Joan Daemen}, title = {The state diagram of {\(\chi\)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2023}, url = {https://eprint.iacr.org/2023/328}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchooneD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDHPAKV23, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer and Beno{\^{\i}}t Viguier}, title = {TurboSHAKE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {342}, year = {2023}, url = {https://eprint.iacr.org/2023/342}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDHPAKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshFAD23, author = {Koustabh Ghosh and Jonathan Fuchs and Parisa Amiri{-}Eliasi and Joan Daemen}, title = {Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {696}, year = {2023}, url = {https://eprint.iacr.org/2023/696}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshFAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshD23, author = {Koustabh Ghosh and Joan Daemen}, title = {Differential properties of integer multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2023}, url = {https://eprint.iacr.org/2023/737}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirchDRM23, author = {Solane El Hirch and Joan Daemen and Raghvendra Rohit and Rusydi H. Makarim}, title = {Twin Column Parity Mixers and Gaston - {A} New Mixing Layer and Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2023}, url = {https://eprint.iacr.org/2023/799}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirchDRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelkheyarDDGR23, author = {Yanis Belkheyar and Joan Daemen and Christoph Dobraunig and Santosh Ghosh and Shahram Rasoolzadeh}, title = {Introducing two Low-Latency Cipher Families: Sonic and SuperSonic}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2023}, url = {https://eprint.iacr.org/2023/878}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BelkheyarDDGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BelliniGRSDH23, author = {Emanuele Bellini and Juan Grados and Mohamed Rachidi and Nitin Satpute and Joan Daemen and Solane El Hirch}, title = {ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations for High-Order avalanche Tests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1352}, year = {2023}, url = {https://eprint.iacr.org/2023/1352}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BelliniGRSDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhoshAD23, author = {Koustabh Ghosh and Parisa Amiri{-}Eliasi and Joan Daemen}, title = {Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1357}, year = {2023}, url = {https://eprint.iacr.org/2023/1357}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhoshAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenMA23, author = {Joan Daemen and Silvia Mella and Gilles Van Assche}, title = {Committing authenticated encryption based on {SHAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1494}, year = {2023}, url = {https://eprint.iacr.org/2023/1494}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LefevreBD23, author = {Charlotte Lefevre and Yanis Belkheyar and Joan Daemen}, title = {Kirby: {A} Robust Permutation-Based {PRF} Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1520}, year = {2023}, url = {https://eprint.iacr.org/2023/1520}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LefevreBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchooneD23a, author = {Jan Schoone and Joan Daemen}, title = {Algebraic properties of the maps {\(\chi\)}\({}_{\mbox{n}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1708}, year = {2023}, url = {https://eprint.iacr.org/2023/1708}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SchooneD23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/SateesanVDM22, author = {Arish Sateesan and Jo Vliegen and Joan Daemen and Nele Mentens}, title = {Hardware-oriented optimization of Bloom filter algorithms and architectures for ultra-high-speed lookups in network applications}, journal = {Microprocess. Microsystems}, volume = {93}, pages = {104619}, year = {2022}, url = {https://doi.org/10.1016/j.micpro.2022.104619}, doi = {10.1016/J.MICPRO.2022.104619}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/SateesanVDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MehrdadMGD22, author = {Alireza Mehrdad and Silvia Mella and Lorenzo Grassi and Joan Daemen}, title = {Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {253--288}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.253-288}, doi = {10.46586/TOSC.V2022.I2.253-288}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/MehrdadMGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HirchMMD22, author = {Solane El Hirch and Silvia Mella and Alireza Mehrdad and Joan Daemen}, title = {Improved Differential and Linear Trail Bounds for {ASCON}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {145--178}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.145-178}, doi = {10.46586/TOSC.V2022.I4.145-178}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/HirchMMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BacuietiDHAK22, author = {Norica Bacuieti and Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Jammin' on the Deck}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {555--584}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_19}, doi = {10.1007/978-3-031-22966-4\_19}, timestamp = {Fri, 03 Feb 2023 17:07:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BacuietiDHAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/BeckersUVVWDDGM22, author = {Arthur Beckers and Roel Uytterhoeven and Thomas Vandenabeele and Jo Vliegen and Lennert Wouters and Joan Daemen and Wim Dehaene and Benedikt Gierlichs and Nele Mentens}, editor = {Luca Sterpone and Andrea Bartolini and Anastasiia Butko}, title = {Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm {FD-SOI} technology}, booktitle = {{CF} '22: 19th {ACM} International Conference on Computing Frontiers, Turin, Italy, May 17 - 22, 2022}, pages = {258--262}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3528416.3530992}, doi = {10.1145/3528416.3530992}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/BeckersUVVWDDGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/KuijstersVD22, author = {Dani{\"{e}}l Kuijsters and Denise Verbakel and Joan Daemen}, editor = {Takanori Isobe and Santanu Sarkar}, title = {Weak Subtweakeys in {SKINNY}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {336--348}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_15}, doi = {10.1007/978-3-031-22912-1\_15}, timestamp = {Mon, 09 Jan 2023 17:58:33 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/KuijstersVD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/africacrypt/2022, editor = {Lejla Batina and Joan Daemen}, title = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9}, doi = {10.1007/978-3-031-17433-9}, isbn = {978-3-031-17433-9}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GunsingDM22, author = {Aldo Gunsing and Joan Daemen and Bart Mennink}, title = {Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2022}, url = {https://eprint.iacr.org/2022/247}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GunsingDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BacuietiDHAK22, author = {Norica Bacuieti and Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, title = {Jammin' on the deck}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2022}, url = {https://eprint.iacr.org/2022/531}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BacuietiDHAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuijstersVD22, author = {Dani{\"{e}}l Kuijsters and Denise Verbakel and Joan Daemen}, title = {Weak Subtweakeys in {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1042}, year = {2022}, url = {https://eprint.iacr.org/2022/1042}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuijstersVD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenMA22, author = {Joan Daemen and Silvia Mella and Gilles Van Assche}, title = {Tighter trail bounds for Xoodoo}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2022}, url = {https://eprint.iacr.org/2022/1088}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsRD22, author = {Jonathan Fuchs and Yann Rotella and Joan Daemen}, title = {On the security of keyed hashing based on an unkeyed block function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1172}, year = {2022}, url = {https://eprint.iacr.org/2022/1172}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsRD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirchMMD22, author = {Solane El Hirch and Silvia Mella and Alireza Mehrdad and Joan Daemen}, title = {Improved Differential and Linear Trail Bounds for {ASCON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1377}, year = {2022}, url = {https://eprint.iacr.org/2022/1377}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HirchMMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BordesDKA21, author = {Nicolas Bordes and Joan Daemen and Dani{\"{e}}l Kuijsters and Gilles Van Assche}, editor = {Tal Malkin and Chris Peikert}, title = {Thinking Outside the Superbox}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {337--367}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_12}, doi = {10.1007/978-3-030-84252-9\_12}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BordesDKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/samos/MiteloudiBDM21, author = {Konstantina Miteloudi and Lejla Batina and Joan Daemen and Nele Mentens}, editor = {Alex Orailoglu and Matthias Jung and Marc Reichenbach}, title = {{ROCKY:} Rotation Countermeasure for the Protection of Keys and Other Sensitive Data}, booktitle = {Embedded Computer Systems: Architectures, Modeling, and Simulation - 21st International Conference, {SAMOS} 2021, Virtual Event, July 4-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13227}, pages = {288--299}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-04580-6\_19}, doi = {10.1007/978-3-031-04580-6\_19}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/samos/MiteloudiBDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/DaemenMM21, author = {Joan Daemen and Alireza Mehrdad and Silvia Mella}, editor = {Lejla Batina and Stjepan Picek and Mainack Mondal}, title = {Computing the Distribution of Differentials over the Non-linear Mapping {\(\chi\)}}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, {SPACE} 2021, Kolkata, India, December 10-13, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13162}, pages = {3--21}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95085-9\_1}, doi = {10.1007/978-3-030-95085-9\_1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/DaemenMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BordesDKA21, author = {Nicolas Bordes and Joan Daemen and Dani{\"{e}}l Kuijsters and Gilles Van Assche}, title = {Thinking Outside the Superbox}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2021}, url = {https://eprint.iacr.org/2021/293}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BordesDKA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/isc/DaemenR20, author = {Joan Daemen and Vincent Rijmen}, title = {The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-662-60769-5}, doi = {10.1007/978-3-662-60769-5}, isbn = {978-3-662-60768-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/isc/DaemenR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DaemenDEGMP20, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {3}, pages = {508--543}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i3.508-543}, doi = {10.13154/TCHES.V2020.I3.508-543}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DaemenDEGMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GunsingDM20, author = {Aldo Gunsing and Joan Daemen and Bart Mennink}, title = {Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {362--366}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.362-366}, doi = {10.13154/TOSC.V2020.I3.362-366}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GunsingDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenHPAK20, author = {Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Xoodyak, a lightweight cryptographic scheme}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {60--87}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.60-87}, doi = {10.13154/TOSC.V2020.IS1.60-87}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DaemenHPAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenMMR20, author = {Joan Daemen and Pedro Maat Costa Massolino and Alireza Mehrdad and Yann Rotella}, title = {The Subterranean 2.0 Cipher Suite}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {{S1}}, pages = {262--294}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.iS1.262-294}, doi = {10.13154/TOSC.V2020.IS1.262-294}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/DaemenMMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/RoelofsSBD20, author = {Niels Roelofs and Niels Samwel and Lejla Batina and Joan Daemen}, editor = {Abderrahmane Nitaj and Amr M. Youssef}, title = {Online Template Attack on {ECDSA:} - Extracting Keys via the Other Side}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12174}, pages = {323--336}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51938-4\_16}, doi = {10.1007/978-3-030-51938-4\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/RoelofsSBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/SateesanVDM20, author = {Arish Sateesan and Jo Vliegen and Joan Daemen and Nele Mentens}, title = {Novel Bloom filter algorithms and architectures for ultra-high-speed network security applications}, booktitle = {23rd Euromicro Conference on Digital System Design, {DSD} 2020, Kranj, Slovenia, August 26-28, 2020}, pages = {262--269}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/DSD51259.2020.00050}, doi = {10.1109/DSD51259.2020.00050}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsd/SateesanVDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SimonBDGMP0S20, author = {Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel}, editor = {Anne Canteaut and Yuval Ishai}, title = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {581--611}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_21}, doi = {10.1007/978-3-030-45721-1\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SimonBDGMP0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SimonBDGMPRS20, author = {Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel}, title = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {425}, year = {2020}, url = {https://eprint.iacr.org/2020/425}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GunsingDM19, author = {Aldo Gunsing and Joan Daemen and Bart Mennink}, title = {Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {1--22}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.1-22}, doi = {10.13154/TOSC.V2019.I4.1-22}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/GunsingDM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenDEGMP19, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gro{\ss} and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2019}, url = {https://eprint.iacr.org/2019/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenDEGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/StoffelenD18, author = {Ko Stoffelen and Joan Daemen}, title = {Column Parity Mixers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {126--159}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.126-159}, doi = {10.13154/TOSC.V2018.I1.126-159}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/StoffelenD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenHAK18, author = {Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, title = {The design of Xoodoo and Xoofff}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {1--38}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.1-38}, doi = {10.13154/TOSC.V2018.I4.1-38}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DaemenHAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/DaemenMA18, author = {Joan Daemen and Bart Mennink and Gilles Van Assche}, title = {Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {4}, pages = {197--228}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i4.197-228}, doi = {10.13154/TOSC.V2018.I4.197-228}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/DaemenMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BertoniDPAKV18, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer and Beno{\^{\i}}t Viguier}, editor = {Bart Preneel and Frederik Vercauteren}, title = {KangarooTwelve: Fast Hashing Based on Keccak-p}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {400--418}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_21}, doi = {10.1007/978-3-319-93387-0\_21}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BertoniDPAKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18, author = {Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella}, editor = {Nigel P. Smart}, title = {Breaking Ed25519 in WolfSSL}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {1--20}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_1}, doi = {10.1007/978-3-319-76953-0\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/DaemenILN18, author = {Joan Daemen and Tetsu Iwata and Nils Gregor Leander and Kaisa Nyberg}, title = {Symmetric Cryptography (Dagstuhl Seminar 18021)}, journal = {Dagstuhl Reports}, volume = {8}, number = {1}, pages = {1--32}, year = {2018}, url = {https://doi.org/10.4230/DagRep.8.1.1}, doi = {10.4230/DAGREP.8.1.1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/DaemenILN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenHAK18, author = {Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, title = {Xoodoo cookbook}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2018}, url = {https://eprint.iacr.org/2018/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenHAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDHPAK18, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2018}, url = {https://eprint.iacr.org/2018/1012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDHPAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MellaDA17, author = {Silvia Mella and Joan Daemen and Gilles Van Assche}, title = {New techniques for trail bounds and application to differential trails in Keccak}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {329--357}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.329-357}, doi = {10.13154/TOSC.V2017.I1.329-357}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MellaDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BertoniDHPAK17, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Farfalle: parallel permutation-based cryptography}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {4}, pages = {1--38}, year = {2017}, url = {https://tosc.iacr.org/index.php/ToSC/article/view/801}, timestamp = {Mon, 08 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BertoniDHPAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DaemenMA17, author = {Joan Daemen and Bart Mennink and Gilles Van Assche}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Full-State Keyed Duplex with Built-In Multi-user Support}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {606--637}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_21}, doi = {10.1007/978-3-319-70697-9\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DaemenMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/SamwelD17, author = {Niels Samwel and Joan Daemen}, title = {{DPA} on hardware implementations of Ascon and Keyak}, booktitle = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy, May 15-17, 2017}, pages = {415--424}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3075564.3079067}, doi = {10.1145/3075564.3079067}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/SamwelD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Daemen17, author = {Joan Daemen}, editor = {Wieland Fischer and Naofumi Homma}, title = {Changing of the Guards: {A} Simple and Efficient Method for Achieving Uniformity in Threshold Sharing}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {137--153}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_7}, doi = {10.1007/978-3-319-66787-4\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Daemen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MellaDA17, author = {Silvia Mella and Joan Daemen and Gilles Van Assche}, title = {New techniques for trail bounds and application to differential trails in Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2017}, url = {http://eprint.iacr.org/2017/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MellaDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenMA17, author = {Joan Daemen and Bart Mennink and Gilles Van Assche}, title = {Full-State Keyed Duplex With Built-In Multi-User Support}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2017}, url = {http://eprint.iacr.org/2017/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SamwelBBDS17, author = {Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella}, title = {Breaking Ed25519 in WolfSSL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {985}, year = {2017}, url = {http://eprint.iacr.org/2017/985}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Daemen16, author = {Joan Daemen}, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {On Non-uniformity in Threshold Sharings}, booktitle = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, pages = {41}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366.2996374}, doi = {10.1145/2996366.2996374}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Daemen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fpl/WinderickxDM16, author = {Jori Winderickx and Joan Daemen and Nele Mentens}, editor = {Paolo Ienne and Walid A. Najjar and Jason Helge Anderson and Philip Brisk and Walter Stechele}, title = {Exploring the use of shift register lookup tables for Keccak implementations on Xilinx FPGAs}, booktitle = {26th International Conference on Field Programmable Logic and Applications, {FPL} 2016, Lausanne, Switzerland, August 29 - September 2, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/FPL.2016.7577367}, doi = {10.1109/FPL.2016.7577367}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fpl/WinderickxDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/Daemen16, author = {Joan Daemen}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Spectral Characterization of Iterating Lossy Mappings}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {159--178}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_9}, doi = {10.1007/978-3-319-49445-6\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/space/Daemen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Daemen16, author = {Joan Daemen}, title = {Spectral characterization of iterating lossy mappings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2016}, url = {http://eprint.iacr.org/2016/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Daemen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPAK16, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {KangarooTwelve: fast hashing based on Keccak-p}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {770}, year = {2016}, url = {http://eprint.iacr.org/2016/770}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Daemen16a, author = {Joan Daemen}, title = {Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1061}, year = {2016}, url = {http://eprint.iacr.org/2016/1061}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Daemen16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPAK16a, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Farfalle: parallel permutation-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2016}, url = {http://eprint.iacr.org/2016/1188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPAK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndreevaDMA15, author = {Elena Andreeva and Joan Daemen and Bart Mennink and Gilles Van Assche}, editor = {Gregor Leander}, title = {Security of Keyed Sponge Constructions Using a Modular Proof Approach}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {364--384}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_18}, doi = {10.1007/978-3-662-48116-5\_18}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndreevaDMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA15, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {389}, year = {2015}, url = {http://eprint.iacr.org/2015/389}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BertoniDPA14, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {The Making of {KECCAK}}, journal = {Cryptologia}, volume = {38}, number = {1}, pages = {26--60}, year = {2014}, url = {https://doi.org/10.1080/01611194.2013.856818}, doi = {10.1080/01611194.2013.856818}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/BertoniDPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BertoniDPA14, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Sufficient conditions for sound tree and sequential hashing modes}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {4}, pages = {335--353}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0220-y}, doi = {10.1007/S10207-013-0220-Y}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/BertoniDPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BertoniDPA14, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Sakura: {A} Flexible Coding for Tree Hashing}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {217--234}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_14}, doi = {10.1007/978-3-319-07536-5\_14}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/BertoniDPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BilginDNNRA13, author = {Beg{\"{u}}l Bilgin and Joan Daemen and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen and Gilles Van Assche}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Efficient and First-Order {DPA} Resistant Implementations of Keccak}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {187--199}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_13}, doi = {10.1007/978-3-319-08302-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BilginDNNRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA13, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Keccak}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {313--314}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_19}, doi = {10.1007/978-3-642-38348-9\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDDLPA13, author = {Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh{-}Ha Le and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Power Analysis of Hardware Implementations Protected with Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {67}, year = {2013}, url = {http://eprint.iacr.org/2013/067}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDDLPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA13, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Sakura: a flexible coding for tree hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2013}, url = {http://eprint.iacr.org/2013/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenA12, author = {Joan Daemen and Gilles Van Assche}, editor = {Anne Canteaut}, title = {Differential Propagation Analysis of Keccak}, booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7549}, pages = {422--441}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34047-5\_24}, doi = {10.1007/978-3-642-34047-5\_24}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/BertoniDDLPA12, author = {Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh{-}Ha Le and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Power analysis of hardware implementations protected with secret sharing}, booktitle = {45th Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2012, Workshops Proceedings, Vancouver, BC, Canada, December 1-5, 2012}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MICROW.2012.12}, doi = {10.1109/MICROW.2012.12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/micro/BertoniDDLPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenA12, author = {Joan Daemen and Gilles Van Assche}, title = {Differential propagation analysis of Keccak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2012}, url = {http://eprint.iacr.org/2012/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BertoniDPA11, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Ali Miri and Serge Vaudenay}, title = {Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {320--337}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_19}, doi = {10.1007/978-3-642-28496-0\_19}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BertoniDPA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/DaemenR11, author = {Joan Daemen and Vincent Rijmen}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Rijndael}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1046--1049}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_611}, doi = {10.1007/978-1-4419-5906-5\_611}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/DaemenR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenDA11, author = {Joan Daemen and Tony Dusenge and Gilles Van Assche}, title = {Sufficient conditions for sound hashing using a truncated permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2011}, url = {http://eprint.iacr.org/2011/459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenDA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA11, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Duplexing the sponge: single-pass authenticated encryption and other applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2011}, url = {http://eprint.iacr.org/2011/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DaemenR10, author = {Joan Daemen and Vincent Rijmen}, title = {The First 10 Years of Advanced Encryption}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {72--74}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.193}, doi = {10.1109/MSP.2010.193}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DaemenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DaemenR10, author = {Joan Daemen and Vincent Rijmen}, title = {Refinements of the {ALRED} construction and {MAC} security claims}, journal = {{IET} Inf. Secur.}, volume = {4}, number = {3}, pages = {149--157}, year = {2010}, url = {https://doi.org/10.1049/iet-ifs.2010.0015}, doi = {10.1049/IET-IFS.2010.0015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DaemenR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BertoniDPA10, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Sponge-Based Pseudo-Random Number Generators}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {33--47}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_3}, doi = {10.1007/978-3-642-15031-9\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BertoniDPA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DaemenR09, author = {Joan Daemen and Vincent Rijmen}, title = {New criteria for linear maps in AES-like ciphers}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {47--69}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0003-x}, doi = {10.1007/S12095-008-0003-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DaemenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/DaemenLPRV09, author = {Joan Daemen and Mario Lamberger and Norbert Pramstaller and Vincent Rijmen and Frederik Vercauteren}, title = {Computational aspects of the expected differential probability of 4-round {AES} and AES-like ciphers}, journal = {Computing}, volume = {85}, number = {1-2}, pages = {85--104}, year = {2009}, url = {https://doi.org/10.1007/s00607-009-0034-y}, doi = {10.1007/S00607-009-0034-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/DaemenLPRV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/DaemenR09, author = {Joan Daemen and Vincent Rijmen}, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {Codes and Provable Security of Ciphers - Extended abstract}, booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, pages = {69--80}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-002-5-69}, doi = {10.3233/978-1-60750-002-5-69}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/DaemenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Sufficient conditions for sound tree hashing modes}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1946/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BertoniDPA09a, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {The Road from Panama to Keccak via RadioGat{\'{u}}n}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1958/}, timestamp = {Thu, 23 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BertoniDPA09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA09, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {Sufficient conditions for sound tree and sequential hashing modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2009}, url = {http://eprint.iacr.org/2009/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BertoniDPA08, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Nigel P. Smart}, title = {On the Indifferentiability of the Sponge Construction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {181--197}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_11}, doi = {10.1007/978-3-540-78967-3\_11}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BertoniDPA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/DaemenK08, author = {Joan Daemen and Paris Kitsos}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {The Self-synchronizing Stream Cipher Moustique}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {210--223}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_16}, doi = {10.1007/978-3-540-68351-3\_16}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/DaemenK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/DaemenR07, author = {Joan Daemen and Vincent Rijmen}, title = {Plateau characteristics}, journal = {{IET} Inf. Secur.}, volume = {1}, number = {1}, pages = {11--17}, year = {2007}, url = {https://doi.org/10.1049/iet-ifs:20060099}, doi = {10.1049/IET-IFS:20060099}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/DaemenR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/DaemenR07, author = {Joan Daemen and Vincent Rijmen}, title = {Probability distributions of correlation and differentials in block ciphers}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {221--242}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.011}, doi = {10.1515/JMC.2007.011}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/DaemenR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenA07, author = {Joan Daemen and Gilles Van Assche}, editor = {Alex Biryukov}, title = {Producing Collisions for Panama, Instantaneously}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {1--18}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_1}, doi = {10.1007/978-3-540-74619-5\_1}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/DaemenA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DaemenR06, author = {Joan Daemen and Vincent Rijmen}, editor = {Roberto De Prisco and Moti Yung}, title = {Understanding Two-Round Differentials in {AES}}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {78--94}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_6}, doi = {10.1007/11832072\_6}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/DaemenR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/DaemenA06, author = {Joan Daemen and Gilles Van Assche}, editor = {Roberto De Prisco and Moti Yung}, title = {Distinguishing Stream Ciphers with Convolutional Filters}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {257--270}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_18}, doi = {10.1007/11832072\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/DaemenA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenR06, author = {Joan Daemen and Vincent Rijmen}, title = {Two-Round {AES} Differentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2006}, url = {http://eprint.iacr.org/2006/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BertoniDPA06, author = {Guido Bertoni and Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, title = {RadioGat{\'{u}}n, a belt-and-mill hash function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2006}, url = {http://eprint.iacr.org/2006/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BertoniDPA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenR05, author = {Joan Daemen and Vincent Rijmen}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New {MAC} Construction {ALRED} and a Specific Instance {ALPHA-MAC}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {1--17}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_1}, doi = {10.1007/11502760\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/DaemenR05, author = {Joan Daemen and Vincent Rijmen}, editor = {Henk C. A. van Tilborg}, title = {Rijndael/AES}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_358}, doi = {10.1007/0-387-23483-7\_358}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/DaemenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenA05, author = {Joan Daemen and Gilles Van Assche}, title = {Distinguishing Stream Ciphers with Convolutional Filters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2005}, url = {http://eprint.iacr.org/2005/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenR05, author = {Joan Daemen and Vincent Rijmen}, title = {The Pelican {MAC} Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2005}, url = {http://eprint.iacr.org/2005/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaemenR05a, author = {Joan Daemen and Vincent Rijmen}, title = {Probability distributions of Correlation and Differentials in Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2005}, url = {http://eprint.iacr.org/2005/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaemenR05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/DaemenR02, author = {Joan Daemen and Vincent Rijmen}, title = {The Design of Rijndael: {AES} - The Advanced Encryption Standard}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-662-04722-4}, doi = {10.1007/978-3-662-04722-4}, isbn = {3-540-42580-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/DaemenR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DaemenR02, author = {Joan Daemen and Vincent Rijmen}, editor = {Lars R. Knudsen}, title = {{AES} and the Wide Trail Design Strategy}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {108--109}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_7}, doi = {10.1007/3-540-46035-7\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DaemenR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DaemenR02, author = {Joan Daemen and Vincent Rijmen}, editor = {Alfred Menezes and Palash Sarkar}, title = {Security of a Wide Trail Design}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {1--11}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_1}, doi = {10.1007/3-540-36231-2\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DaemenR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2002, editor = {Joan Daemen and Vincent Rijmen}, title = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9}, doi = {10.1007/3-540-45661-9}, isbn = {3-540-44009-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DaemenKR01, author = {Joan Daemen and Lars R. Knudsen and Vincent Rijmen}, title = {Linear Frameworks for Block Ciphers}, journal = {Des. Codes Cryptogr.}, volume = {22}, number = {1}, pages = {65--87}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DaemenKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/DaemenR01, author = {Joan Daemen and Vincent Rijmen}, editor = {Bahram Honary}, title = {The Wide Trail Design Strategy}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {222--238}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_20}, doi = {10.1007/3-540-45325-3\_20}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/DaemenR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/DaemenR00, author = {Joan Daemen and Vincent Rijmen}, title = {Rijndael for {AES}}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {343--348}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/DaemenR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenPA00, author = {Joan Daemen and Micha{\"{e}}l Peeters and Gilles Van Assche}, editor = {Bruce Schneier}, title = {Bitslice Ciphers and Power Analysis Attacks}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {134--149}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_10}, doi = {10.1007/3-540-44706-7\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenPA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcard/RijmenD99, author = {Vincent Rijmen and Joan Daemen}, editor = {Scott B. Guthery and Peter Honeyman}, title = {Efficient Block Ciphers for Smartcards}, booktitle = {Proceedings of the 1st Workshop on Smartcard Technology, Smartcard 1999, Chicago, Illinois, USA, May 10-11, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/usenix-workshop-smartcard-technology/efficient-block-ciphers-smartcards}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/smartcard/RijmenD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DawirsD98, author = {Michel Dawirs and Joan Daemen}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {The Banksys Signature Transport {(BST)} Protocol}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {43--51}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_4}, doi = {10.1007/10721064\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DawirsD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DaemenR98, author = {Joan Daemen and Vincent Rijmen}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {The Block Cipher {BKSQ}}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {236--245}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_22}, doi = {10.1007/10721064\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DaemenR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DaemenR98a, author = {Joan Daemen and Vincent Rijmen}, editor = {Jean{-}Jacques Quisquater and Bruce Schneier}, title = {The Block Cipher Rijndael}, booktitle = {Smart Card Research and Applications, This International Conference, {CARDIS} '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1820}, pages = {277--284}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/10721064\_26}, doi = {10.1007/10721064\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DaemenR98a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenC98, author = {Joan Daemen and Craig S. K. Clapp}, editor = {Serge Vaudenay}, title = {Fast Hashing and Stream Encryption with {PANAMA}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {60--74}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_5}, doi = {10.1007/3-540-69710-1\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ac/Daemen97, author = {Joan Daemen}, editor = {Bart Preneel and Vincent Rijmen}, title = {Management of Secret Keys: Dynamic Key Handling}, booktitle = {State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures}, series = {Lecture Notes in Computer Science}, volume = {1528}, pages = {264--276}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-49248-8\_12}, doi = {10.1007/3-540-49248-8\_12}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/ac/Daemen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenKR97, author = {Joan Daemen and Lars R. Knudsen and Vincent Rijmen}, editor = {Eli Biham}, title = {The Block Cipher Square}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {149--165}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052343}, doi = {10.1007/BFB0052343}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenKR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenDPBW96, author = {Vincent Rijmen and Joan Daemen and Bart Preneel and Antoon Bosselaers and Erik De Win}, editor = {Dieter Gollmann}, title = {The Cipher {SHARK}}, booktitle = {Fast Software Encryption, Third International Workshop, Cambridge, UK, February 21-23, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1039}, pages = {99--111}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-60865-6\_47}, doi = {10.1007/3-540-60865-6\_47}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenDPBW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenGV94, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Bart Preneel}, title = {Correlation Matrices}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {275--285}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_21}, doi = {10.1007/3-540-60590-8\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenGV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DaemenGV93, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Douglas R. Stinson}, title = {Weak Keys for {IDEA}}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {224--231}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_20}, doi = {10.1007/3-540-48329-2\_20}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DaemenGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DaemenGV93, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Tor Helleseth}, title = {Resynchronization Weaknesses in Synchronous Stream Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {159--167}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_14}, doi = {10.1007/3-540-48285-7\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DaemenGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/DaemenGV93, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Ross J. Anderson}, title = {A New Approach to Block Cipher Design}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {18--32}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_2}, doi = {10.1007/3-540-58108-1\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/DaemenGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/ClaesenDGP93, author = {Luc J. M. Claesen and Joan Daemen and Mark Genoe and G. Peeters}, title = {Subterranean: {A} 600 Mbit/Sec Cryptographic {VLSI} Chip}, booktitle = {Proceedings 1993 International Conference on Computer Design: {VLSI} in Computers {\&} Processors, {ICCD} '93, Cambridge, MA, USA, October 3-6, 1993}, pages = {610--613}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/ICCD.1993.393304}, doi = {10.1109/ICCD.1993.393304}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/ClaesenDGP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DaemenGV92, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Yves Deswarte and G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, title = {A Hardware Design Model for Cryptographic Algorithms}, booktitle = {Computer Security - {ESORICS} 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {648}, pages = {419--434}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013911}, doi = {10.1007/BFB0013911}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DaemenGV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DaemenGV91, author = {Joan Daemen and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damg{\aa}rd's One-Way Function Based on a Cellular Automaton}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {82--96}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_7}, doi = {10.1007/3-540-57332-1\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DaemenGV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DaemenBGV91, author = {Joan Daemen and Antoon Bosselaers and Ren{\'{e}} Govaerts and Joos Vandewalle}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {477--480}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_41}, doi = {10.1007/3-540-57332-1\_41}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DaemenBGV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Daemen91, author = {Joan Daemen}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Limitations of the Even-Mansour Construction}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {495--498}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_46}, doi = {10.1007/3-540-57332-1\_46}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Daemen91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/HegerWND85, author = {Dirk Heger and Kym Watson and I. G. Niemeggers and Joan Daemen}, editor = {Dirk Heger and Gerhard Kr{\"{u}}ger and Otto Spaniol and Werner Zorn}, title = {Performance Analysis of Local Area Networks for Real Time Environments}, booktitle = {Kommunikation in Verteilten Systemen II, Anwendungen, Betrieb, Grundlagen, GI/ITG-Fachtagung, Karlsruhe, 13.-15. M{\"{a}}rz 1985, Proceedings}, series = {Informatik-Fachberichte}, volume = {111}, pages = {91--107}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/978-3-642-70836-7\_7}, doi = {10.1007/978-3-642-70836-7\_7}, timestamp = {Tue, 23 May 2017 01:06:28 +0200}, biburl = {https://dblp.org/rec/conf/kivs/HegerWND85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.