
Vincent Rijmen
Person information
- affiliation: KU Leuven, Belgium
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [b2]Joan Daemen, Vincent Rijmen:
The Design of Rijndael - The Advanced Encryption Standard (AES), Second Edition. Information Security and Cryptography, Springer 2020, ISBN 978-3-662-60768-8, pp. 1-247 - [j46]Yunwen Liu
, Wenying Zhang, Bing Sun, Vincent Rijmen, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. Des. Codes Cryptogr. 88(11): 2289-2311 (2020) - [j45]Tomer Ashur
, Tim Beyne, Vincent Rijmen:
Revisiting the Wrong-Key-Randomization Hypothesis. J. Cryptol. 33(2): 567-594 (2020) - [c92]Liliya Kraleva, Tomer Ashur, Vincent Rijmen:
Rotational Cryptanalysis on MAC Algorithm Chaskey. ACNS (1) 2020: 153-168 - [c91]Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen:
A Bit-Vector Differential Model for the Modular Addition by a Constant. ASIACRYPT (1) 2020: 385-414 - [c90]Liliya Kraleva, Raluca Posteuca, Vincent Rijmen:
Cryptanalysis of the Permutation Based Algorithm SpoC. INDOCRYPT 2020: 273-293 - [i46]Anastasiya Gorodilova, Natalia N. Tokareva, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeria Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Roman Lebedev, Svetla Nikova, Alexey Oblaukhov, Irina Pankratova, Marina Pudovkina, Vincent Rijmen, Aleksei Udovenko:
On the Sixth International Olympiad in Cryptography NSUCRYPTO. CoRR abs/2005.09563 (2020) - [i45]Liliya Kraleva, Tomer Ashur, Vincent Rijmen:
Rotational Cryptanalysis on MAC Algorithm Chaskey. IACR Cryptol. ePrint Arch. 2020: 538 (2020) - [i44]Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based Method for the Experimental Verification of Difference Trails. IACR Cryptol. ePrint Arch. 2020: 632 (2020) - [i43]Liliya Kraleva, Nikolai L. Manev, Vincent Rijmen:
Correlation distribution analysis of a two-round key-alternating block cipher. IACR Cryptol. ePrint Arch. 2020: 645 (2020) - [i42]Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen:
A Bit-Vector Differential Model for the Modular Addition by a Constant. IACR Cryptol. ePrint Arch. 2020: 1025 (2020) - [i41]Liliya Kraleva, Raluca Posteuca, Vincent Rijmen:
Cryptanalysis of the permutation based algorithm SpoC. IACR Cryptol. ePrint Arch. 2020: 1072 (2020)
2010 – 2019
- 2019
- [j44]Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Decomposition of permutations in a finite field. Cryptogr. Commun. 11(3): 379-384 (2019) - [j43]Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Constructions of S-boxes with uniform sharing. Cryptogr. Commun. 11(3): 385-398 (2019) - [j42]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Svetla Nikova, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Vincent Rijmen, Natalia N. Tokareva:
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO). Cryptologia 43(2): 138-174 (2019) - [j41]Wenying Zhang, Vincent Rijmen:
Division cryptanalysis of block ciphers with a binary diffusion layer. IET Inf. Secur. 13(2): 87-95 (2019) - [j40]Gülsüm Gözde Güzel, Muharrem Tolga Sakalli, Sedat Akleylek, Vincent Rijmen, Yasemin Cengellenmis:
A new matrix form to generate all 3 × 3 involutory MDS matrices over F2m. Inf. Process. Lett. 147: 61-68 (2019) - [j39]Victor Arribas
, Svetla Nikova, Vincent Rijmen
:
Guards in action: First-order SCA secure implementations of KETJE without additional randomness. Microprocess. Microsystems 71 (2019) - [j38]Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
M&M: Masks and Macs against Physical Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 25-50 (2019) - [c89]Siemen Dhooghe
, Svetla Nikova, Vincent Rijmen:
Threshold Implementations in the Robust Probing Model. TIS@CCS 2019: 30-37 - [c88]Begül Bilgin, Svetla Nikova, Vincent Rijmen:
TIS'19: Theory of Implementation Security Workshop 2019. CCS 2019: 2701-2702 - [c87]Dusan Bozilov, Ventzislav Nikov, Vincent Rijmen:
Design Trade-offs in Threshold Implementations. ICECS 2019: 751-754 - [e16]Begül Bilgin, Svetla Petkova-Nikova, Vincent Rijmen:
Proceedings of ACM Workshop on Theory of Implementation Security Workshop, TIS@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6827-8 [contents] - [e15]Yuval Ishai, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11476, Springer 2019, ISBN 978-3-030-17652-5 [contents] - [e14]Yuval Ishai, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11477, Springer 2019, ISBN 978-3-030-17655-6 [contents] - [e13]Yuval Ishai, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11478, Springer 2019, ISBN 978-3-030-17658-7 [contents] - [i40]Siemen Dhooghe, Svetla Nikova, Vincent Rijmen:
Threshold Implementations in the Robust Probing Model. IACR Cryptol. ePrint Arch. 2019: 1005 (2019) - 2018
- [j37]Wei Li, Vincent Rijmen, Zhi Tao, Qingju Wang, Hua Chen, Yunwen Liu, Chaoyun Li
, Ya Liu:
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs. Sci. China Inf. Sci. 61(3): 032110:1-032110:13 (2018) - [j36]Yunwen Liu
, Vincent Rijmen, Gregor Leander
:
Nonlinear diffusion layers. Des. Codes Cryptogr. 86(11): 2469-2484 (2018) - [j35]Meltem Kurt Pehlivanoglu
, Muharrem Tolga Sakalli, Sedat Akleylek
, Nevcihan Duru, Vincent Rijmen:
Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography. IET Inf. Secur. 12(4): 348-355 (2018) - [j34]Yunwen Liu, Vincent Rijmen:
New observations on invariant subspace attack. Inf. Process. Lett. 138: 27-30 (2018) - [j33]Victor Arribas, Begül Bilgin, George Petrides
, Svetla Nikova, Vincent Rijmen:
Rhythmic Keccak: SCA Security and Low Latency in HW. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(1): 269-290 (2018) - [c86]Victor Arribas, Svetla Nikova, Vincent Rijmen:
Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness. DSD 2018: 492-499 - [c85]Victor Arribas, Svetla Nikova, Vincent Rijmen:
VerMI: Verification Tool for Masked Implementations. ICECS 2018: 381-384 - [e12]Jesper Buus Nielsen, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Lecture Notes in Computer Science 10820, Springer 2018, ISBN 978-3-319-78380-2 [contents] - [e11]Jesper Buus Nielsen, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II. Lecture Notes in Computer Science 10821, Springer 2018, ISBN 978-3-319-78374-1 [contents] - [e10]Jesper Buus Nielsen, Vincent Rijmen:
Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III. Lecture Notes in Computer Science 10822, Springer 2018, ISBN 978-3-319-78371-0 [contents] - [i39]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Svetla Nikova, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Vincent Rijmen, Natalia N. Tokareva:
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO. CoRR abs/1806.02059 (2018) - [i38]Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Constructions of S-boxes with uniform sharing. IACR Cryptol. ePrint Arch. 2018: 92 (2018) - [i37]Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Decomposition of Permutations in a Finite Field. IACR Cryptol. ePrint Arch. 2018: 103 (2018) - [i36]Victor Arribas, Svetla Nikova, Vincent Rijmen:
Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness. IACR Cryptol. ePrint Arch. 2018: 806 (2018) - [i35]Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
M&M: Masks and Macs against Physical Attacks. IACR Cryptol. ePrint Arch. 2018: 1195 (2018) - 2017
- [j32]Mahdi Sajadieh, Arash Mirzaei, Hamid Mala, Vincent Rijmen:
A new counting method to bound the number of active S-boxes in Rijndael and 3D. Des. Codes Cryptogr. 83(2): 327-343 (2017) - [j31]Sedat Akleylek
, Vincent Rijmen, Muharrem Tolga Sakalli, Emir Öztürk
:
Efficient methods to generate cryptographically significant binary diffusion layers. IET Inf. Secur. 11(4): 177-187 (2017) - [c84]Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? COSADE 2017: 1-18 - [i34]Wenying Zhang, Vincent Rijmen:
Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer. IACR Cryptol. ePrint Arch. 2017: 188 (2017) - [i33]Yunwen Liu, Vincent Rijmen:
New Observations on Invariant Subspace Attack. IACR Cryptol. ePrint Arch. 2017: 278 (2017) - [i32]Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen:
Rhythmic Keccak: SCA Security and Low Latency in HW. IACR Cryptol. ePrint Arch. 2017: 1193 (2017) - [i31]Victor Arribas, Svetla Nikova, Vincent Rijmen:
VerMI: Verification Tool for Masked Implementations. IACR Cryptol. ePrint Arch. 2017: 1227 (2017) - 2016
- [c83]Yunwen Liu, Qingju Wang
, Vincent Rijmen:
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. ACNS 2016: 485-499 - [c82]Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES With d+1 Shares in Hardware. TIS@CCS 2016: 43 - [c81]Begül Bilgin, Svetla Nikova, Vincent Rijmen:
Theory of Implementation Security Workshop (TIs 2016). CCS 2016: 1875-1876 - [c80]Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES with d+1 Shares in Hardware. CHES 2016: 194-212 - [c79]Bing Sun, Meicheng Liu, Jian Guo
, Longjiang Qu, Vincent Rijmen:
New Insights on AES-Like SPN Ciphers. CRYPTO (1) 2016: 605-624 - [c78]Bing Sun, Meicheng Liu, Jian Guo
, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis. EUROCRYPT (1) 2016: 196-213 - [c77]Hua Chen, Jingyi Feng, Vincent Rijmen, Yunwen Liu, Limin Fan, Wei Li:
Improved Fault Analysis on SIMON Block Cipher Family. FDTC 2016: 16-24 - [c76]Tomer Ashur
, Vincent Rijmen:
On Linear Hulls and Trails. INDOCRYPT 2016: 269-286 - [e9]Begül Bilgin, Svetla Nikova, Vincent Rijmen:
Proceedings of the ACM Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016. ACM 2016, ISBN 978-1-4503-4575-0 [contents] - [i30]Tomer Ashur, Vincent Rijmen:
On Linear Hulls and Trails in Simon. IACR Cryptol. ePrint Arch. 2016: 88 (2016) - [i29]Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2016: 96 (2016) - [i28]Faruk Göloglu, Vincent Rijmen, Qingju Wang:
On the division property of S-boxes. IACR Cryptol. ePrint Arch. 2016: 188 (2016) - [i27]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-like SPN Ciphers. IACR Cryptol. ePrint Arch. 2016: 533 (2016) - [i26]Thomas De Cnudde, Oscar Reparaz, Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES with d+1 Shares in Hardware. IACR Cryptol. ePrint Arch. 2016: 631 (2016) - [i25]Tomer Ashur, Tim Beyne, Vincent Rijmen:
Revisiting the Wrong-Key-Randomization Hypothesis. IACR Cryptol. ePrint Arch. 2016: 990 (2016) - [i24]Thomas De Cnudde, Begül Bilgin, Benedikt Gierlichs, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen:
Does Coupling Affect the Security of Masked Implementations? IACR Cryptol. ePrint Arch. 2016: 1080 (2016) - 2015
- [j30]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Natalia N. Tokareva
, Valeriya Vitkup:
Threshold implementations of small S-boxes. Cryptogr. Commun. 7(1): 3-33 (2015) - [j29]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
:
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12): 1-15 (2015) - [j28]Mario Lamberger, Florian Mendel, Martin Schläffer, Christian Rechberger, Vincent Rijmen:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. J. Cryptol. 28(2): 257-296 (2015) - [j27]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Trade-Offs for Threshold Implementations Illustrated on AES. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(7): 1188-1200 (2015) - [c75]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang
, Hoda AlKhzaimi, Chao Li:
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. CRYPTO (1) 2015: 95-115 - [c74]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. FSE 2015: 494-515 - [i23]Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda AlKhzaimi, Chao Li:
Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2015: 181 (2015) - [i22]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. IACR Cryptol. ePrint Arch. 2015: 433 (2015) - [i21]Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia N. Tokareva, Valeriya Vitkup:
Problems, solutions and experience of the first international student's Olympiad in cryptography. IACR Cryptol. ePrint Arch. 2015: 534 (2015) - 2014
- [j26]Andrey Bogdanov, Vincent Rijmen:
Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptogr. 70(3): 369-383 (2014) - [c73]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
A More Efficient AES Threshold Implementation. AFRICACRYPT 2014: 267-284 - [c72]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Higher-Order Threshold Implementations. ASIACRYPT (2) 2014: 326-343 - [c71]Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. FSE 2014: 509-521 - [c70]Qingju Wang
, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo
:
Cryptanalysis of Reduced-Round SIMON32 and SIMON48. INDOCRYPT 2014: 143-160 - [i20]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede:
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms. IACR Cryptol. ePrint Arch. 2014: 84 (2014) - [i19]Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. IACR Cryptol. ePrint Arch. 2014: 305 (2014) - [i18]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Higher-Order Threshold Implementations. IACR Cryptol. ePrint Arch. 2014: 751 (2014) - [i17]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-round SIMON32 and SIMON48. IACR Cryptol. ePrint Arch. 2014: 761 (2014) - 2013
- [j25]Justin Troutman, Vincent Rijmen:
Mackerel: A Progressive School of Cryptographic Thought. login Usenix Mag. 38(6) (2013) - [c69]Andrey Bogdanov, Christina Boura, Vincent Rijmen, Meiqin Wang, Long Wen, Jingyuan Zhao:
Key Difference Invariant Bias in Block Ciphers. ASIACRYPT (1) 2013: 357-376 - [c68]Begül Bilgin, Joan Daemen, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Gilles Van Assche:
Efficient and First-Order DPA Resistant Implementations of Keccak. CARDIS 2013: 187-199 - [c67]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Collisions for the WIDEA-8 Compression Function. CT-RSA 2013: 162-173 - [c66]Andrey Bogdanov
, Florian Mendel, Francesco Regazzoni
, Vincent Rijmen, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. FSE 2013: 447-466 - [i16]Begül Bilgin, Benedikt Gierlichs, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
A More Efficient AES Threshold Implementation. IACR Cryptol. ePrint Arch. 2013: 697 (2013) - 2012
- [j24]Mario Lamberger, Florian Mendel, Vincent Rijmen, Koen Simoens:
Memoryless near-collisions via coding theory. Des. Codes Cryptogr. 62(1): 1-18 (2012) - [j23]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Pierre-Alain Fouque, Nathan Keller, Vincent Rijmen:
Low-Data Complexity Attacks on AES. IEEE Trans. Inf. Theory 58(11): 7002-7017 (2012) - [c65]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. ASIACRYPT 2012: 190-207 - [c64]Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser:
A Simple Key-Recovery Attack on McOE-X. CANS 2012: 23-31 - [c63]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz:
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes. CHES 2012: 76-91 - [c62]Qingju Wang
, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov
:
Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140 - [c61]Mario Lamberger, Florian Mendel, Vincent Rijmen:
Collision Attack on the Hamsi-256 Compression Function. INDOCRYPT 2012: 156-171 - [c60]Vincent Rijmen:
Extracts from the SHA-3 Competition. Selected Areas in Cryptography 2012: 81-85 - [i15]Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Georg Stütz:
Threshold Implementations of all 3x3 and 4x4 S-boxes. IACR Cryptol. ePrint Arch. 2012: 300 (2012) - [i14]Florian Mendel, Vincent Rijmen, Deniz Toz, Kerem Varici:
Differential Analysis of the LED Block Cipher. IACR Cryptol. ePrint Arch. 2012: 544 (2012) - 2011
- [j22]Svetla Nikova, Vincent Rijmen, Martin Schläffer:
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches. J. Cryptol. 24(2): 292-321 (2011) - [r3]Joan Daemen, Vincent Rijmen:
Rijndael. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1046-1049 - [r2]Paulo S. L. M. Barreto, Vincent Rijmen:
Whirlpool. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1384-1385 - [i13]Andrey Bogdanov, Vincent Rijmen:
Zero-Correlation Linear Cryptanalysis of Block Ciphers. IACR Cryptol. ePrint Arch. 2011: 123 (2011) - 2010
- [j21]Paulo S. L. M. Barreto, Ventzislav Nikov, Svetla Nikova, Vincent Rijmen, Elmar Tischhauser:
Whirlwind: a new cryptographic hash function. Des. Codes Cryptogr. 56(2-3): 141-162 (2010) - [j20]Joan Daemen, Vincent Rijmen:
The First 10 Years of Advanced Encryption. IEEE Secur. Priv. 8(6): 72-74 (2010) - [j19]Vesselin Velichkov, Vincent Rijmen, Bart Preneel
:
Algebraic cryptanalysis of a small-scale version of stream cipher Lex. IET Inf. Secur. 4(2): 49-61 (2010) - [j18]Joan Daemen, Vincent Rijmen:
Refinements of the ALRED construction and MAC security claims. IET Inf. Secur. 4(3): 149-157 (2010) - [j17]Vincent Rijmen:
Stream ciphers and the eSTREAM project. ISC Int. J. Inf. Secur. 2(1): 3-11 (2010) - [c59]Vincent Rijmen, Deniz Toz, Kerem Varici:
Rebound Attack on Reduced-Round Versions of JH. FSE 2010: 286-303 - [c58]Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, Mahmoud Modarres-Hashemi:
Improved Impossible Differential Cryptanalysis of 7-Round AES-128. INDOCRYPT 2010: 282-291 - [c57]Mario Lamberger, Vincent Rijmen:
Optimal Covering Codes for Finding Near-Collisions. Selected Areas in Cryptography 2010: 187-197 - [i12]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
The Rebound Attack and Subspace Distinguishers: Application to Whirlpool. IACR Cryptol. ePrint Arch. 2010: 198 (2010) - [i11]Vincent Rijmen:
Practical-Titled Attack on AES-128 Using Chosen-Text Relations. IACR Cryptol. ePrint Arch. 2010: 337 (2010) - [i10]Charles Bouillaguet, Patrick Derbez, Orr Dunkelman, Nathan Keller, Vincent Rijmen, Pierre-Alain Fouque:
Low Data Complexity Attacks on AES. IACR Cryptol. ePrint Arch. 2010: 633 (2010)
2000 – 2009
- 2009
- [j16]Joan Daemen, Vincent Rijmen:
New criteria for linear maps in AES-like ciphers. Cryptogr. Commun. 1(1): 47-69 (2009) - [j15]Clemens Heuberger, Vincent Rijmen:
Editorial. Computing 85(1-2): 1-2 (2009) - [j14]Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren
:
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Computing 85(1-2): 85-104 (2009) - [j13]Justin Troutman, Vincent Rijmen:
Green Cryptography: Cleaner Engineering through Recycling. IEEE Secur. Priv. 7(4): 71-73 (2009) - [j12]Justin Troutman, Vincent Rijmen:
Green Cryptography: Cleaner Engineering through Recycling, Part 2. IEEE Secur. Priv. 7(5): 64-65 (2009) - [j11]Mario Lamberger, Tomislav Nad, Vincent Rijmen:
Numerical solvers and cryptanalysis. J. Math. Cryptol. 3(3): 249-263 (2009) - [c56]Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer:
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 - [p1]Joan Daemen, Vincent Rijmen:
Codes and Provable Security of Ciphers - Extended abstract. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 69-80 - [e8]Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini:
Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5867, Springer 2009, ISBN 978-3-642-05443-3 [contents] - [e7]Bart Preneel, Stefan M. Dodunekov, Vincent Rijmen, Svetla Nikova:
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. NATO Science for Peace and Security Series - D: Information and Communication Security 23, IOS Press 2009, ISBN 978-1-60750-002-5 [contents] - 2008
- [j10]