The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

René Govaerts: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Cryptography Within Phase I of the EEC-RACE Programme. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:227-234 [Conf]
  2. Bart Preneel, René Govaerts, Joos Vandewalle
    Information Authentication: Hash Functions and Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:87-131 [Conf]
  3. Joos Vandewalle, René Govaerts, Bart Preneel
    Technical Approaches to Thwart Computer Fraud. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:20-30 [Conf]
  4. Jan Verschuren, René Govaerts, Joos Vandewalle
    ISO-OSI Security Architecture. [Citation Graph (0, 0)][DBLP]
    Computer Security and Industrial Cryptography, 1991, pp:179-192 [Conf]
  5. Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:477-480 [Conf]
  6. Joan Daemen, René Govaerts, Joos Vandewalle
    A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:82-96 [Conf]
  7. Bart Preneel, René Govaerts, Joos Vandewalle
    On the Power of Memory in the Design of Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:105-121 [Conf]
  8. Bart Preneel, René Govaerts, Joos Vandewalle
    An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:535-538 [Conf]
  9. Bart Preneel, René Govaerts, Joos Vandewalle
    Differential Cryptanalysis of Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:183-188 [Conf]
  10. Cristian Radu, René Govaerts, Joos Vandewalle
    A Restrictive Blind Signature Scheme with Applications to Electronic Cash. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1996, pp:196-207 [Conf]
  11. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Comparison of Three Modular Reduction Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:175-186 [Conf]
  12. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Fast Hashing on the Pentium. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:298-312 [Conf]
  13. Joan Daemen, René Govaerts, Joos Vandewalle
    Weak Keys for IDEA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:224-231 [Conf]
  14. Bart Preneel, Antoon Bosselaers, René Govaerts, Joos Vandewalle
    A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:154-163 [Conf]
  15. Bart Preneel, René Govaerts, Joos Vandewalle
    Hash Functions Based on Block Ciphers: A Synthetic Approach. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:368-378 [Conf]
  16. Marc Davio, Yvo Desmedt, Marc Fosseprez, René Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piret, Jean-Jacques Quisquater, Joos Vandewalle, Pascal Wouters
    Analytical Characteristics of the DES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1983, pp:171-202 [Conf]
  17. Jan Verschuren, René Govaerts, Joos Vandewalle
    Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:168-178 [Conf]
  18. Joan Daemen, René Govaerts, Joos Vandewalle
    A Hardware Design Model for Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:419-434 [Conf]
  19. Antoon Bosselaers, René Govaerts, Joos Vandewalle
    SHA: A Design for Parallel Architectures? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:348-362 [Conf]
  20. Henri Cloetens, Yvo Desmedt, Luc Bierens, Joos Vandewalle, René Govaerts
    Additional Properties in the S-Boxes of the DES. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:20- [Conf]
  21. Joan Daemen, René Govaerts, Joos Vandewalle
    Resynchronization Weaknesses in Synchronous Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:159-167 [Conf]
  22. F. Jorissen, Joos Vandewalle, René Govaerts
    Extension of Brickell's Algorithm for Breaking High Density Knapsacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:109-115 [Conf]
  23. Frank Hoornaert, Marc Decroos, Joos Vandewalle, René Govaerts
    Fast RSA-Hardware: Dream or Reality? [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:257-264 [Conf]
  24. Bart Preneel, René Govaerts, Joos Vandewalle
    Boolean Functions Satisfying Higher Order Propagation Criteria. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:141-152 [Conf]
  25. Bart Preneel, Werner Van Leekwijck, Luc Van Linden, René Govaerts, Joos Vandewalle
    Propagation Characteristics of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:161-173 [Conf]
  26. Joos Vandewalle, René Govaerts, W. De Becker, Marc Decroos, G. Speybrouck
    Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1985, pp:43-49 [Conf]
  27. Cristian Radu, René Govaerts, Joos Vandewalle
    Efficient Electronic Cash with Restricted Privacy. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1997, pp:57-70 [Conf]
  28. Joan Daemen, René Govaerts, Joos Vandewalle
    A New Approach to Block Cipher Design. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:18-32 [Conf]
  29. Joan Daemen, René Govaerts, Joos Vandewalle
    Correlation Matrices. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:275-285 [Conf]
  30. René Govaerts, Yvo Desmedt, Joos Vandewalle
    Cryptography: How to Attack, What to Protect? [Citation Graph (0, 0)][DBLP]
    ICC (1), 1984, pp:175-178 [Conf]
  31. Cristian Radu, René Govaerts, Joos Vandewalle
    Prepaid Electronic Cheques Using Public-Key Certificates. [Citation Graph (0, 0)][DBLP]
    IMA Conf., 1995, pp:132-141 [Conf]
  32. Cristian Radu, René Govaerts, Joos Vandewalle
    Witness Hiding Restrictive Blind Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1997, pp:283-294 [Conf]
  33. Mark Vandenwauver, René Govaerts, Joos Vandewalle
    How Role Based Access Control is Implemented in SESAME. [Citation Graph (0, 0)][DBLP]
    WETICE, 1997, pp:293-298 [Conf]
  34. Yvo Desmedt, Joos Vandewalle, René Govaerts
    A critical analysis of the security of knapsack public-key algorithms. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:601-610 [Journal]

  35. Cryptanalysis of a fast cryptographic checksum algorithm. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002