Search the dblp DataBase
Vincent Rijmen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Bart Preneel , Vincent Rijmen , Antoon Bosselaers Recent Developments in the Design of Conventional Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP ] State of the Art in Applied Cryptography, 1997, pp:105-130 [Conf ] Joan Daemen , Vincent Rijmen Rijndael for AES. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:343-348 [Conf ] Vincent Rijmen , Elisabeth Oswald Representations and Rijndael Descriptions. [Citation Graph (0, 0)][DBLP ] AES Conference, 2004, pp:148-158 [Conf ] Carl D'Halluin , Gert Bijnens , Bart Preneel , Vincent Rijmen Equivalent Keys of HPC. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:29-42 [Conf ] Lars R. Knudsen , Willi Meier , Bart Preneel , Vincent Rijmen , Sven Verdoolaege Analysis Methods for (Alleged) RC4. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:327-341 [Conf ] Joan Daemen , Vincent Rijmen The Block Cipher BKSQ. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:236-245 [Conf ] Joan Daemen , Vincent Rijmen The Block Cipher Rijndael. [Citation Graph (0, 0)][DBLP ] CARDIS, 1998, pp:277-284 [Conf ] Bart Preneel , Marnix Nuttin , Vincent Rijmen , Johan Buelens Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:212-223 [Conf ] Vincent Rijmen , Elisabeth Oswald Update on SHA-1. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:58-71 [Conf ] Ove Scavenius , Martin Boesgaard , Thomas Pedersen , Jesper Christiansen , Vincent Rijmen Periodic Properties of Counter Assisted Stream Ciphers. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:39-53 [Conf ] Mario Lamberger , Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Second Preimages for SMASH. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:101-111 [Conf ] Johan Borst , Lars R. Knudsen , Vincent Rijmen Two Attacks on Reduced IDEA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1997, pp:1-13 [Conf ] Joan Daemen , Vincent Rijmen AES and the Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:108-109 [Conf ] Norbert Pramstaller , Christian Rechberger , Vincent Rijmen A compact FPGA implementation of the hash function whirlpool. [Citation Graph (0, 0)][DBLP ] FPGA, 2006, pp:159-166 [Conf ] Carl D'Halluin , Gert Bijnens , Vincent Rijmen , Bart Preneel Attack on Six Rounds of Crypton. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:46-59 [Conf ] Joan Daemen , Lars R. Knudsen , Vincent Rijmen The Block Cipher Square. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:149-165 [Conf ] Joan Daemen , Vincent Rijmen A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:1-17 [Conf ] Paulo S. L. M. Barreto , Vincent Rijmen , Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle , Hae Yong Kim Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:165-173 [Conf ] Eli Biham , Vladimir Furman , Michal Misztal , Vincent Rijmen Differential Cryptanalysis of Q. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:174-186 [Conf ] Lars R. Knudsen , Vincent Rijmen On the Decorrelated Fast Cipher (DFC) and Its Theory. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:81-94 [Conf ] Lars R. Knudsen , Vincent Rijmen , Ronald L. Rivest , Matthew J. B. Robshaw On the Design and Security of RC2. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:206-221 [Conf ] Elisabeth Oswald , Stefan Mangard , Norbert Pramstaller , Vincent Rijmen A Side-Channel Analysis Resistant Description of the AES S-Box. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:413-423 [Conf ] Vincent Rijmen , Joan Daemen , Bart Preneel , Antoon Bosselaers , Erik De Win The Cipher SHARK. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:99-111 [Conf ] Vincent Rijmen , Bart Preneel Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:242-248 [Conf ] Vincent Rijmen , Bart Preneel Cryptanalysis of McGuffin. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:353-358 [Conf ] Vincent Rijmen , Bart Preneel A Family of Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:139-148 [Conf ] Vincent Rijmen , Bart Van Rompay , Bart Preneel , Joos Vandewalle Producing Collisions for PANAMA. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:37-51 [Conf ] Bart Van Rompay , Lars R. Knudsen , Vincent Rijmen Differential Cryptanalysis of the ICE Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:270-283 [Conf ] Florian Mendel , Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Analysis of Step-Reduced SHA-256. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:126-143 [Conf ] Florian Mendel , Norbert Pramstaller , Christian Rechberger , Vincent Rijmen The Impact of Carries on the Complexity of Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:278-292 [Conf ] Svetla Nikova , Christian Rechberger , Vincent Rijmen Threshold Implementations Against Side-Channel Attacks and Glitches. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:529-545 [Conf ] Paulo S. L. M. Barreto , Hae Yong Kim , Vincent Rijmen Toward a secure public-key blockwise fragile authentication watermarking. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2001, pp:494-497 [Conf ] Joan Daemen , Vincent Rijmen The Wide Trail Design Strategy. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2001, pp:222-238 [Conf ] Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Exploiting Coding Theory for Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:78-95 [Conf ] Joan Daemen , Vincent Rijmen Security of a Wide Trail Design. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:1-11 [Conf ] Florian Mendel , Bart Preneel , Vincent Rijmen , Hirotaka Yoshida , Dai Watanabe Update on Tiger. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:63-79 [Conf ] Florian Mendel , Norbert Pramstaller , Christian Rechberger , Vincent Rijmen On the Collision Resistance of RIPEMD-160. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:101-116 [Conf ] Chris Hall , John Kelsey , Vincent Rijmen , Bruce Schneier , David Wagner Cryptanalysis of SPEED. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:319-338 [Conf ] Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Breaking a New Hash Function Design Strategy Called SMASH. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:233-244 [Conf ] Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Impact of Rotations in SHA-1 and Related Hash Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2005, pp:261-275 [Conf ] Joan Daemen , Vincent Rijmen Understanding Two-Round Differentials in AES. [Citation Graph (0, 0)][DBLP ] SCN, 2006, pp:78-94 [Conf ] Krystian Matusiewicz , Josef Pieprzyk , Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Analysis of simplified variants of SHA-256. [Citation Graph (0, 0)][DBLP ] WEWoRC, 2005, pp:123-134 [Conf ] Malek Bechlaghem , Vincent Rijmen Proving Key Usage. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:65-72 [Conf ] Jorge Nakahara Jr. , Vincent Rijmen , Bart Preneel , Joos Vandewalle The MESH Block Ciphers. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:458-473 [Conf ] Johan Borst , Bart Preneel , Vincent Rijmen Cryptography on smart cards. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2001, v:36, n:4, pp:423-435 [Journal ] Joan Daemen , Lars R. Knudsen , Vincent Rijmen Linear Frameworks for Block Ciphers. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2001, v:22, n:1, pp:65-87 [Journal ] Vincent Rijmen , Bart Preneel , Erik De Win On Weaknesses of Non-surjective Round Functions. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1997, v:12, n:3, pp:253-266 [Journal ] Christian Rechberger , Vincent Rijmen , Nicolas Sklavos The NIST Cryptographic Workshop on Hash Functions. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:54-56 [Journal ] Norbert Pramstaller , Mario Lamberger , Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:68-81 [Conf ] Lars R. Knudsen , Vincent Rijmen Known-Key Distinguishers for Some Block Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:315-324 [Conf ] Florian Mendel , Vincent Rijmen Cryptanalysis of the Tiger Hash Function. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:536-550 [Conf ] Florian Mendel , Vincent Rijmen Weaknesses in the HAS-V Compression Function. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:335-345 [Conf ] Florian Mendel , Vincent Rijmen Colliding Message Pair for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:324-334 [Conf ] Rebound Distinguishers: Results on the Full Whirlpool Compression Function. [Citation Graph (, )][DBLP ] 07021 Executive Summary -- Symmetric Cryptography. [Citation Graph (, )][DBLP ] 07021 Abstracts Collection -- Symmetric Cryptography. [Citation Graph (, )][DBLP ] On Authentication with HMAC and Non-random Properties. [Citation Graph (, )][DBLP ] Rebound Attack on Reduced-Round Versions of JH. [Citation Graph (, )][DBLP ] Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. [Citation Graph (, )][DBLP ] Using Normal Bases for Compact Hardware Implementations of the AES S-Box. [Citation Graph (, )][DBLP ] Correlated Keystreams in Moustique. [Citation Graph (, )][DBLP ] Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. [Citation Graph (, )][DBLP ] Editorial. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.422secs