[go: up one dir, main page]

Follow
Joan Daemen
Joan Daemen
Professor, Radboud University
Verified email at noekeon.org - Homepage
Title
Cited by
Cited by
Year
The design of Rijndael
J Daemen, V Rijmen
Springer-verlag, 2002
78622002
AES proposal: Rijndael
J Daemen, V Rijmen
29101999
The block cipher Square
J Daemen, L Knudsen, V Rijmen
International Workshop on Fast Software Encryption, 149-165, 1997
12831997
Reijndael: The advanced encryption standard.
J Daemen, V Rijmen
Dr. Dobb's Journal: Software Tools for the Professional Programmer 26 (3 …, 2001
1160*2001
The block cipher Rijndael
J Daemen, V Rijmen
International Conference on Smart Card Research and Advanced Applications …, 1998
7801998
On the indifferentiability of the sponge construction
G Bertoni, J Daemen, M Peeters, G Van Assche
Annual International Conference on the Theory and Applications of …, 2008
6632008
Sponge functions
G Bertoni, J Daemen, M Peeters, G Van Assche
ECRYPT hash workshop 2007 (9), 2007
6462007
Cipher and hash function design strategies based on linear and differential cryptanalysis
J Daemen
Doctoral Dissertation, March 1995, KU Leuven, 1995
5891995
Duplexing the sponge: single-pass authenticated encryption and other applications
G Bertoni, J Daemen, M Peeters, G Van Assche
International Workshop on Selected Areas in Cryptography, 320-337, 2011
5672011
Keccak
G Bertoni, J Daemen, M Peeters, G Van Assche
Annual international conference on the theory and applications of …, 2013
5252013
Keccak sponge function family main document
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 2) 3 (30), 320-337, 2009
4472009
Rijndael/aes
J Daemen, V Rijmen
Encyclopedia of Cryptography and Security, 520-524, 2005
4172005
The cipher SHARK
V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win
International Workshop on Fast Software Encryption, 99-111, 1996
3671996
The wide trail design strategy
J Daemen, V Rijmen
IMA International Conference on Cryptography and Coding, 222-238, 2001
3002001
The keccak sha-3 submission
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 3) 6 (7), 16, 2011
2672011
Correlation matrices
J Daemen, V Rijmen, J Daemen, V Rijmen
The Design of Rijndael: The Advanced Encryption Standard (AES), 91-113, 2020
2212020
Cryptographic sponge functions
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 3) 3, 2011
2032011
Permutation-based encryption, authentication and authenticated encryption
J Daemen, G Bertoni, M Peeters, GV Assche
DIAC–Directions in Authenticated Ciphers, 2012
2002012
Weak keys for IDEA
J Daemen, R Govaerts, J Vandewalle
Annual International Cryptology Conference, 224-231, 1993
1981993
Probability distributions of correlation and differentials in block ciphers
J Daemen, V Rijmen
Journal of Mathematical Cryptology 1 (3), 221-242, 2007
1852007
The system can't perform the operation now. Try again later.
Articles 1–20