Search the dblp DataBase
René Govaerts :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Antoon Bosselaers , René Govaerts , Joos Vandewalle Cryptography Within Phase I of the EEC-RACE Programme. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:227-234 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Information Authentication: Hash Functions and Digital Signatures. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:87-131 [Conf ] Joos Vandewalle , René Govaerts , Bart Preneel Technical Approaches to Thwart Computer Fraud. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:20-30 [Conf ] Jan Verschuren , René Govaerts , Joos Vandewalle ISO-OSI Security Architecture. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:179-192 [Conf ] Joan Daemen , Antoon Bosselaers , René Govaerts , Joos Vandewalle Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:477-480 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:82-96 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle On the Power of Memory in the Design of Collision Resistant Hash Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:105-121 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle An Attack on Two Hash Functions by Zheng-Matsumoto-Imai. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:535-538 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Differential Cryptanalysis of Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:183-188 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle A Restrictive Blind Signature Scheme with Applications to Electronic Cash. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 1996, pp:196-207 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle Comparison of Three Modular Reduction Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:175-186 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle Fast Hashing on the Pentium. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:298-312 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle Weak Keys for IDEA. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:224-231 [Conf ] Bart Preneel , Antoon Bosselaers , René Govaerts , Joos Vandewalle A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:154-163 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Hash Functions Based on Block Ciphers: A Synthetic Approach. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:368-378 [Conf ] Marc Davio , Yvo Desmedt , Marc Fosseprez , René Govaerts , Jan Hulsbosch , Patrik Neutjens , Philippe Piret , Jean-Jacques Quisquater , Joos Vandewalle , Pascal Wouters Analytical Characteristics of the DES. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1983, pp:171-202 [Conf ] Jan Verschuren , René Govaerts , Joos Vandewalle Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:168-178 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:419-434 [Conf ] Antoon Bosselaers , René Govaerts , Joos Vandewalle SHA: A Design for Parallel Architectures? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:348-362 [Conf ] Henri Cloetens , Yvo Desmedt , Luc Bierens , Joos Vandewalle , René Govaerts Additional Properties in the S-Boxes of the DES. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:20- [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle Resynchronization Weaknesses in Synchronous Stream Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:159-167 [Conf ] F. Jorissen , Joos Vandewalle , René Govaerts Extension of Brickell's Algorithm for Breaking High Density Knapsacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:109-115 [Conf ] Frank Hoornaert , Marc Decroos , Joos Vandewalle , René Govaerts Fast RSA-Hardware: Dream or Reality? [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:257-264 [Conf ] Bart Preneel , René Govaerts , Joos Vandewalle Boolean Functions Satisfying Higher Order Propagation Criteria. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:141-152 [Conf ] Bart Preneel , Werner Van Leekwijck , Luc Van Linden , René Govaerts , Joos Vandewalle Propagation Characteristics of Boolean Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:161-173 [Conf ] Joos Vandewalle , René Govaerts , W. De Becker , Marc Decroos , G. Speybrouck Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:43-49 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle Efficient Electronic Cash with Restricted Privacy. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1997, pp:57-70 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle A New Approach to Block Cipher Design. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:18-32 [Conf ] Joan Daemen , René Govaerts , Joos Vandewalle Correlation Matrices. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:275-285 [Conf ] René Govaerts , Yvo Desmedt , Joos Vandewalle Cryptography: How to Attack, What to Protect? [Citation Graph (0, 0)][DBLP ] ICC (1), 1984, pp:175-178 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle Prepaid Electronic Cheques Using Public-Key Certificates. [Citation Graph (0, 0)][DBLP ] IMA Conf., 1995, pp:132-141 [Conf ] Cristian Radu , René Govaerts , Joos Vandewalle Witness Hiding Restrictive Blind Signature Scheme. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:283-294 [Conf ] Mark Vandenwauver , René Govaerts , Joos Vandewalle How Role Based Access Control is Implemented in SESAME. [Citation Graph (0, 0)][DBLP ] WETICE, 1997, pp:293-298 [Conf ] Yvo Desmedt , Joos Vandewalle , René Govaerts A critical analysis of the security of knapsack public-key algorithms. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1984, v:30, n:4, pp:601-610 [Journal ] Cryptanalysis of a fast cryptographic checksum algorithm. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.328secs