Folgen
Joan Daemen
Joan Daemen
Professor, Radboud University
Bestätigte E-Mail-Adresse bei noekeon.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The design of Rijndael
J Daemen, V Rijmen
Springer-verlag, 2002
73562002
AES Proposal: Rijndael
J Daemen
Version, 1999
27571999
The block cipher Square
J Daemen, L Knudsen, V Rijmen
Fast Software Encryption: 4th International Workshop, FSE’97 Haifa, Israel …, 1997
12441997
Advanced encryption standard
V Rijmen, J Daemen
Proceedings of federal information processing standards publications …, 2001
1040*2001
The block cipher Rijndael
J Daemen, V Rijmen
International Conference on Smart Card Research and Advanced Applications …, 1998
7521998
On the indifferentiability of the sponge construction
G Bertoni, J Daemen, M Peeters, G Van Assche
Annual International Conference on the Theory and Applications of …, 2008
6012008
Sponge functions
G Bertoni, J Daemen, M Peeters, G Van Assche
ECRYPT hash workshop 2007 (9), 2007
5732007
Cipher and hash function design strategies based on linear and differential cryptanalysis
J Daemen
Doctoral Dissertation, March 1995, KU Leuven, 1995
5631995
Duplexing the sponge: single-pass authenticated encryption and other applications
G Bertoni, J Daemen, M Peeters, G Van Assche
Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012
4992012
Keccak
G Bertoni, J Daemen, M Peeters, G Van Assche
Annual international conference on the theory and applications of …, 2013
4502013
Keccak sponge function family main document
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 2) 3 (30), 320-337, 2009
4152009
Rijndael for AES.
J Daemen, V Rijmen
AES Candidate Conference, 343-348, 2000
3952000
The cipher SHARK
V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win
Fast Software Encryption: Third International Workshop Cambridge, UK …, 1996
3681996
The wide trail design strategy
J Daemen, V Rijmen
Cryptography and Coding: 8th IMA International Conference Cirencester, UK …, 2001
2752001
The keccak sha-3 submission
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 3) 6 (7), 16, 2011
2712011
Correlation matrices
J Daemen, V Rijmen, J Daemen, V Rijmen
The Design of Rijndael: The Advanced Encryption Standard (AES), 91-113, 2020
1972020
Weak keys for IDEA
J Daemen, R Govaerts, J Vandewalle
Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994
1971994
Probability distributions of correlation and differentials in block ciphers
J Daemen, V Rijmen
Journal of Mathematical Cryptology 1 (3), 221-242, 2007
1932007
Cryptographic sponge functions
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 3), 6, 2011
1842011
Permutation-based encryption, authentication and authenticated encryption
G Bertoni, J Daemen, M Peeters, G Van Assche
Directions in Authenticated Ciphers, 159-170, 2012
1742012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20