The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Joan Daemen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joan Daemen
    Management of Secret Keys: Dynamic Key Handling. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:264-276 [Conf]
  2. Joan Daemen, Vincent Rijmen
    Rijndael for AES. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:343-348 [Conf]
  3. Joan Daemen
    Limitations of the Even-Mansour Construction. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:495-498 [Conf]
  4. Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle
    Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:477-480 [Conf]
  5. Joan Daemen, René Govaerts, Joos Vandewalle
    A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:82-96 [Conf]
  6. Joan Daemen, Vincent Rijmen
    The Block Cipher BKSQ. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:236-245 [Conf]
  7. Joan Daemen, Vincent Rijmen
    The Block Cipher Rijndael. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:277-284 [Conf]
  8. Michel Dawirs, Joan Daemen
    The Banksys Signature Transport (BST) Protocol. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:43-51 [Conf]
  9. Joan Daemen, René Govaerts, Joos Vandewalle
    Weak Keys for IDEA. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:224-231 [Conf]
  10. Joan Daemen, René Govaerts, Joos Vandewalle
    A Hardware Design Model for Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:419-434 [Conf]
  11. Joan Daemen, René Govaerts, Joos Vandewalle
    Resynchronization Weaknesses in Synchronous Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:159-167 [Conf]
  12. Joan Daemen, Vincent Rijmen
    AES and the Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:108-109 [Conf]
  13. Joan Daemen, Craig S. K. Clapp
    Fast Hashing and Stream Encryption with PANAMA. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:60-74 [Conf]
  14. Joan Daemen, René Govaerts, Joos Vandewalle
    A New Approach to Block Cipher Design. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:18-32 [Conf]
  15. Joan Daemen, René Govaerts, Joos Vandewalle
    Correlation Matrices. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:275-285 [Conf]
  16. Joan Daemen, Lars R. Knudsen, Vincent Rijmen
    The Block Cipher Square. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:149-165 [Conf]
  17. Joan Daemen, Michael Peeters, Gilles Van Assche
    Bitslice Ciphers and Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:134-149 [Conf]
  18. Joan Daemen, Vincent Rijmen
    A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:1-17 [Conf]
  19. Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win
    The Cipher SHARK. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:99-111 [Conf]
  20. Luc J. M. Claesen, Joan Daemen, Mark Genoe, G. Peeters
    Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip. [Citation Graph (0, 0)][DBLP]
    ICCD, 1993, pp:610-613 [Conf]
  21. Joan Daemen, Vincent Rijmen
    The Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:222-238 [Conf]
  22. Joan Daemen, Vincent Rijmen
    Security of a Wide Trail Design. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:1-11 [Conf]
  23. Dirk Heger, Kym Watson, I. G. Niemeggers, Joan Daemen
    Performance Analysis of Local Area Networks for Real Time Environments. [Citation Graph (0, 0)][DBLP]
    Kommunikation in Verteilten Systemen (2), 1985, pp:91-107 [Conf]
  24. Joan Daemen, Vincent Rijmen
    Understanding Two-Round Differentials in AES. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:78-94 [Conf]
  25. Joan Daemen, Gilles Van Assche
    Distinguishing Stream Ciphers with Convolutional Filters. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:257-270 [Conf]
  26. Joan Daemen, Lars R. Knudsen, Vincent Rijmen
    Linear Frameworks for Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:22, n:1, pp:65-87 [Journal]
  27. Joan Daemen, Gilles Van Assche
    Producing Collisions for Panama, Instantaneously. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:1-18 [Conf]

  28. Sponge-Based Pseudo-Random Number Generators. [Citation Graph (, )][DBLP]


  29. On the Indifferentiability of the Sponge Construction. [Citation Graph (, )][DBLP]


  30. Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002