The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vincent Rijmen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bart Preneel, Vincent Rijmen, Antoon Bosselaers
    Recent Developments in the Design of Conventional Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    State of the Art in Applied Cryptography, 1997, pp:105-130 [Conf]
  2. Joan Daemen, Vincent Rijmen
    Rijndael for AES. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:343-348 [Conf]
  3. Vincent Rijmen, Elisabeth Oswald
    Representations and Rijndael Descriptions. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:148-158 [Conf]
  4. Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen
    Equivalent Keys of HPC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:29-42 [Conf]
  5. Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege
    Analysis Methods for (Alleged) RC4. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:327-341 [Conf]
  6. Joan Daemen, Vincent Rijmen
    The Block Cipher BKSQ. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:236-245 [Conf]
  7. Joan Daemen, Vincent Rijmen
    The Block Cipher Rijndael. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:277-284 [Conf]
  8. Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens
    Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:212-223 [Conf]
  9. Vincent Rijmen, Elisabeth Oswald
    Update on SHA-1. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:58-71 [Conf]
  10. Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen
    Periodic Properties of Counter Assisted Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:39-53 [Conf]
  11. Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Second Preimages for SMASH. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:101-111 [Conf]
  12. Johan Borst, Lars R. Knudsen, Vincent Rijmen
    Two Attacks on Reduced IDEA. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1997, pp:1-13 [Conf]
  13. Joan Daemen, Vincent Rijmen
    AES and the Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:108-109 [Conf]
  14. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    A compact FPGA implementation of the hash function whirlpool. [Citation Graph (0, 0)][DBLP]
    FPGA, 2006, pp:159-166 [Conf]
  15. Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel
    Attack on Six Rounds of Crypton. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:46-59 [Conf]
  16. Joan Daemen, Lars R. Knudsen, Vincent Rijmen
    The Block Cipher Square. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:149-165 [Conf]
  17. Joan Daemen, Vincent Rijmen
    A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:1-17 [Conf]
  18. Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim
    Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:165-173 [Conf]
  19. Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen
    Differential Cryptanalysis of Q. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:174-186 [Conf]
  20. Lars R. Knudsen, Vincent Rijmen
    On the Decorrelated Fast Cipher (DFC) and Its Theory. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:81-94 [Conf]
  21. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw
    On the Design and Security of RC2. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:206-221 [Conf]
  22. Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen
    A Side-Channel Analysis Resistant Description of the AES S-Box. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:413-423 [Conf]
  23. Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win
    The Cipher SHARK. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:99-111 [Conf]
  24. Vincent Rijmen, Bart Preneel
    Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:242-248 [Conf]
  25. Vincent Rijmen, Bart Preneel
    Cryptanalysis of McGuffin. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:353-358 [Conf]
  26. Vincent Rijmen, Bart Preneel
    A Family of Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:139-148 [Conf]
  27. Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle
    Producing Collisions for PANAMA. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:37-51 [Conf]
  28. Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
    Differential Cryptanalysis of the ICE Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:270-283 [Conf]
  29. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Analysis of Step-Reduced SHA-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:126-143 [Conf]
  30. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    The Impact of Carries on the Complexity of Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:278-292 [Conf]
  31. Svetla Nikova, Christian Rechberger, Vincent Rijmen
    Threshold Implementations Against Side-Channel Attacks and Glitches. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:529-545 [Conf]
  32. Paulo S. L. M. Barreto, Hae Yong Kim, Vincent Rijmen
    Toward a secure public-key blockwise fragile authentication watermarking. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2001, pp:494-497 [Conf]
  33. Joan Daemen, Vincent Rijmen
    The Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:222-238 [Conf]
  34. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Exploiting Coding Theory for Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:78-95 [Conf]
  35. Joan Daemen, Vincent Rijmen
    Security of a Wide Trail Design. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:1-11 [Conf]
  36. Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe
    Update on Tiger. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:63-79 [Conf]
  37. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    On the Collision Resistance of RIPEMD-160. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:101-116 [Conf]
  38. Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner
    Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:319-338 [Conf]
  39. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Breaking a New Hash Function Design Strategy Called SMASH. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:233-244 [Conf]
  40. Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Impact of Rotations in SHA-1 and Related Hash Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:261-275 [Conf]
  41. Joan Daemen, Vincent Rijmen
    Understanding Two-Round Differentials in AES. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:78-94 [Conf]
  42. Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Analysis of simplified variants of SHA-256. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:123-134 [Conf]
  43. Malek Bechlaghem, Vincent Rijmen
    Proving Key Usage. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:65-72 [Conf]
  44. Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle
    The MESH Block Ciphers. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:458-473 [Conf]
  45. Johan Borst, Bart Preneel, Vincent Rijmen
    Cryptography on smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:36, n:4, pp:423-435 [Journal]
  46. Joan Daemen, Lars R. Knudsen, Vincent Rijmen
    Linear Frameworks for Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:22, n:1, pp:65-87 [Journal]
  47. Vincent Rijmen, Bart Preneel, Erik De Win
    On Weaknesses of Non-surjective Round Functions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1997, v:12, n:3, pp:253-266 [Journal]
  48. Christian Rechberger, Vincent Rijmen, Nicolas Sklavos
    The NIST Cryptographic Workshop on Hash Functions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:54-56 [Journal]
  49. Norbert Pramstaller, Mario Lamberger, Vincent Rijmen
    Second Preimages for Iterated Hash Functions and Their Implications on MACs. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:68-81 [Conf]
  50. Lars R. Knudsen, Vincent Rijmen
    Known-Key Distinguishers for Some Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:315-324 [Conf]
  51. Florian Mendel, Vincent Rijmen
    Cryptanalysis of the Tiger Hash Function. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:536-550 [Conf]
  52. Florian Mendel, Vincent Rijmen
    Weaknesses in the HAS-V Compression Function. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:335-345 [Conf]
  53. Florian Mendel, Vincent Rijmen
    Colliding Message Pair for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:324-334 [Conf]

  54. Rebound Distinguishers: Results on the Full Whirlpool Compression Function. [Citation Graph (, )][DBLP]


  55. 07021 Executive Summary -- Symmetric Cryptography. [Citation Graph (, )][DBLP]


  56. 07021 Abstracts Collection -- Symmetric Cryptography. [Citation Graph (, )][DBLP]


  57. On Authentication with HMAC and Non-random Properties. [Citation Graph (, )][DBLP]


  58. Rebound Attack on Reduced-Round Versions of JH. [Citation Graph (, )][DBLP]


  59. Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. [Citation Graph (, )][DBLP]


  60. Using Normal Bases for Compact Hardware Implementations of the AES S-Box. [Citation Graph (, )][DBLP]


  61. Correlated Keystreams in Moustique. [Citation Graph (, )][DBLP]


  62. Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. [Citation Graph (, )][DBLP]


  63. Editorial. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.422secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002