Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Vincent Rijmen
2010 – today
- 2013
[c66]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici: Collisions for the WIDEA-8 Compression Function. CT-RSA 2013: 162-173- 2012
[j22]Mario Lamberger, Florian Mendel, Vincent Rijmen, Koen Simoens: Memoryless near-collisions via coding theory. Des. Codes Cryptography 62(1): 1-18 (2012)
[j21]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller, Vincent Rijmen: Low-Data Complexity Attacks on AES. IEEE Transactions on Information Theory 58(11): 7002-7017 (2012)
[c65]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici: Differential Analysis of the LED Block Cipher. ASIACRYPT 2012: 190-207
[c64]Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser: A Simple Key-Recovery Attack on McOE-X. CANS 2012: 23-31
[c63]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz: Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes. CHES 2012: 76-91
[c62]Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov: Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140
[c61]Mario Lamberger, Florian Mendel, Vincent Rijmen: Collision Attack on the Hamsi-256 Compression Function. INDOCRYPT 2012: 156-171
[c60]
[i14]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz: Threshold Implementations of all 3x3 and 4x4 S-boxes. IACR Cryptology ePrint Archive 2012: 300 (2012)
[i13]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici: Differential Analysis of the LED Block Cipher. IACR Cryptology ePrint Archive 2012: 544 (2012)- 2011
[j20]Svetla Nikova, Vincent Rijmen, Martin Schläffer: Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. J. Cryptology 24(2): 292-321 (2011)
[r3]Joan Daemen, Vincent Rijmen: Rijndael. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1046-1049
[r2]Paulo S. L. M. Barreto, Vincent Rijmen: Whirlpool. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1384-1385
[i12]Andrey Bogdanov, Vincent Rijmen: Zero-Correlation Linear Cryptanalysis of Block Ciphers. IACR Cryptology ePrint Archive 2011: 123 (2011)- 2010
[j19]Paulo S. L. M. Barreto, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Elmar Tischhauser: Whirlwind: a new cryptographic hash function. Des. Codes Cryptography 56(2-3): 141-162 (2010)
[j18]Joan Daemen, Vincent Rijmen: The First 10 Years of Advanced Encryption. IEEE Security & Privacy 8(6): 72-74 (2010)
[j17]Vesselin Velichkov, Vincent Rijmen, Bart Preneel: Algebraic cryptanalysis of a small-scale version of stream cipher Lex. IET Information Security 4(2): 49-61 (2010)
[j16]Joan Daemen, Vincent Rijmen: Refinements of the ALRED construction and MAC security claims. IET Information Security 4(3): 149-157 (2010)
[c59]Vincent Rijmen, Deniz Toz, Kerem Varici: Rebound Attack on Reduced-Round Versions of JH. FSE 2010: 286-303
[c58]Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, Mahmoud Modarres-Hashemi: Improved Impossible Differential Cryptanalysis of 7-Round AES-128. INDOCRYPT 2010: 282-291
[c57]Mario Lamberger, Vincent Rijmen: Optimal Covering Codes for Finding Near-Collisions. Selected Areas in Cryptography 2010: 187-197
[i11]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer: The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. IACR Cryptology ePrint Archive 2010: 198 (2010)
[i10]Vincent Rijmen: Practical-Titled Attack on AES-128 Using Chosen-Text Relations. IACR Cryptology ePrint Archive 2010: 337 (2010)
[i9]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque: Low Data Complexity Attacks on AES. IACR Cryptology ePrint Archive 2010: 633 (2010)
2000 – 2009
- 2009
[j15]Joan Daemen, Vincent Rijmen: New criteria for linear maps in AES-like ciphers. Cryptography and Communications 1(1): 47-69 (2009)
[j14]
[j13]Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren: Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Computing 85(1-2): 85-104 (2009)
[j12]Justin Troutman, Vincent Rijmen: Green Cryptography: Cleaner Engineering through Recycling. IEEE Security & Privacy 7(4): 71-73 (2009)
[j11]Justin Troutman, Vincent Rijmen: Green Cryptography: Cleaner Engineering through Recycling, Part 2. IEEE Security & Privacy 7(5): 64-65 (2009)
[j10]Mario Lamberger, Tomislav Nad, Vincent Rijmen: Numerical solvers and cryptanalysis. J. Mathematical Cryptology 3(3): 249-263 (2009)
[c56]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer: Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143
[e7]Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (Eds.): Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5867, Springer 2009, ISBN 978-3-642-05443-3- 2008
[j9]Vincent Rijmen, Paulo S. L. M. Barreto, Décio L. Gazzoni Filho: Rotation symmetry in algebraically generated cryptographic substitution tables. Inf. Process. Lett. 106(6): 246-250 (2008)
[j8]Christian Rechberger, Vincent Rijmen: New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. J. UCS 14(3): 347-376 (2008)
[j7]Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of the Hash Function Design Strategy Called SMASH. IEEE Transactions on Information Theory 54(8): 3647-3655 (2008)
[c55]Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar: Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257
[c54]Svetla Nikova, Vincent Rijmen, Martin Schläffer: Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. ICISC 2008: 218-234
[c53]Svetla Nikova, Vincent Rijmen, Martin Schläffer: Using Normal Bases for Compact Hardware Implementations of the AES S-Box. SCN 2008: 236-245
[e6]Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das (Eds.): Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings. Lecture Notes in Computer Science 5365, Springer 2008, ISBN 978-3-540-89753-8
[e5]Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee (Eds.): Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings. Lecture Notes in Computer Science 5222, Springer 2008, ISBN 978-3-540-85884-3
[i8]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of Step-Reduced SHA-256. IACR Cryptology ePrint Archive 2008: 130 (2008)- 2007
[j6]
[j5]Joan Daemen, Vincent Rijmen: Probability distributions of correlation and differentials in block ciphers. J. Mathematical Cryptology 1(3): 221-242 (2007)
[c52]Norbert Pramstaller, Mario Lamberger, Vincent Rijmen: Second Preimages for Iterated Hash Functions and Their Implications on MACs. ACISP 2007: 68-81
[c51]Lars R. Knudsen, Vincent Rijmen: Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324
[c50]
[c49]Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Second Preimages for SMASH. CT-RSA 2007: 101-111
[c48]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007
[c47]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007
[c46]Christian Rechberger, Vincent Rijmen: On Authentication with HMAC and Non-random Properties. Financial Cryptography 2007: 119-133
[c45]
[c44]
[e4]Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen (Eds.): Symmetric Cryptography, 07.01. - 12.01.2007. Dagstuhl Seminar Proceedings 07021, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007- 2006
[j4]Christian Rechberger, Vincent Rijmen, Nicolas Sklavos: The NIST Cryptographic Workshop on Hash Functions. IEEE Security & Privacy 4(1): 54-56 (2006)
[c43]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: A compact FPGA implementation of the hash function whirlpool. FPGA 2006: 159-166
[c42]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of Step-Reduced SHA-256. FSE 2006: 126-143
[c41]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292
[c40]Svetla Nikova, Christian Rechberger, Vincent Rijmen: Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545
[c39]Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe: Update on Tiger. INDOCRYPT 2006: 63-79
[c38]Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116
[c37]
[i7]Joan Daemen, Vincent Rijmen: Two-Round AES Differentials. IACR Cryptology ePrint Archive 2006: 39 (2006)
[i6]Mario Lamberger, Norbert Pramstaller, Vincent Rijmen: Second Preimages for Iterated Hash Functions Based on a b-Block Bypass. IACR Cryptology ePrint Archive 2006: 116 (2006)
[i5]Christian Rechberger, Vincent Rijmen: On Authentication with HMAC and Non-Random Properties. IACR Cryptology ePrint Archive 2006: 290 (2006)- 2005
[c36]
[c35]Joan Daemen, Vincent Rijmen: A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. FSE 2005: 1-17
[c34]Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen: A Side-Channel Analysis Resistant Description of the AES S-Box. FSE 2005: 413-423
[c33]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Exploiting Coding Theory for Collision Attacks on SHA-1. IMA Int. Conf. 2005: 78-95
[c32]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Breaking a New Hash Function Design Strategy Called SMASH. Selected Areas in Cryptography 2005: 233-244
[c31]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Impact of Rotations in SHA-1 and Related Hash Functions. Selected Areas in Cryptography 2005: 261-275
[c30]Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134
[e3]Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (Eds.): Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers. Lecture Notes in Computer Science 3373, Springer 2005, ISBN 3-540-26557-0
[r1]
[i4]
[i3]Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Smashing SMASH. IACR Cryptology ePrint Archive 2005: 81 (2005)
[i2]Joan Daemen, Vincent Rijmen: The Pelican MAC Function. IACR Cryptology ePrint Archive 2005: 88 (2005)
[i1]Joan Daemen, Vincent Rijmen: Probability distributions of Correlation and Differentials in Block Ciphers. IACR Cryptology ePrint Archive 2005: 212 (2005)- 2004
[c29]Vincent Rijmen, Elisabeth Oswald: Representations and Rijndael Descriptions. AES Conference 2004: 148-158
[c28]Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen: Periodic Properties of Counter Assisted Stream Ciphers. CT-RSA 2004: 39-53
[c27]- 2003
[c26]Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle: The MESH Block Ciphers. WISA 2003: 458-473- 2002
[b1]Joan Daemen, Vincent Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography, Springer 2002, ISBN 3-540-42580-2
[c25]
[c24]
[e2]Joan Daemen, Vincent Rijmen (Eds.): Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers. Lecture Notes in Computer Science 2365, Springer 2002, ISBN 3-540-44009-7- 2001
[j3]Johan Borst, Bart Preneel, Vincent Rijmen: Cryptography on smart cards. Computer Networks 36(4): 423-435 (2001)
[j2]Joan Daemen, Lars R. Knudsen, Vincent Rijmen: Linear Frameworks for Block Ciphers. Des. Codes Cryptography 22(1): 65-87 (2001)
[c23]Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle: Producing Collisions for PANAMA. FSE 2001: 37-51
[c22]Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim: Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. FSE 2001: 165-173
[c21]Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186
[c20]Paulo S. L. M. Barreto, Hae Yong Kim, Vincent Rijmen: Toward a secure public-key blockwise fragile authentication watermarking. ICIP (2) 2001: 494-497
[c19]- 2000
[c18]
1990 – 1999
- 1999
[c17]Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen: Equivalent Keys of HPC. ASIACRYPT 1999: 29-42
[c16]Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel: Attack on Six Rounds of Crypton. FSE 1999: 46-59
[c15]Lars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94- 1998
[c14]Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341
[c13]
[c12]
[c11]Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw: On the Design and Security of RC2. FSE 1998: 206-221
[c10]Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen: Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283
[c9]Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338
[e1]Bart Preneel, Vincent Rijmen (Eds.): State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures. Lecture Notes in Computer Science 1528, Springer 1998, ISBN 3-540-65474-7- 1997
[j1]Vincent Rijmen, Bart Preneel, Erik De Win: On Weaknesses of Non-surjective Round Functions. Des. Codes Cryptography 12(3): 253-266 (1997)
[c8]Bart Preneel, Vincent Rijmen, Antoon Bosselaers: Recent Developments in the Design of Conventional Cryptographic Algorithms. State of the Art in Applied Cryptography 1997: 105-130
[c7]
[c6]
[c5]- 1996
[c4]Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win: The Cipher SHARK. FSE 1996: 99-111- 1994
[c3]Vincent Rijmen, Bart Preneel: Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. FSE 1994: 242-248
[c2]- 1993
[c1]Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens: Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. CRYPTO 1993: 212-223
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:08 CEST by the dblp team



