Joan Daemen

Results: 53



#Item
11Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
12NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
13NIST hash function competition / SHA-3 / Cryptographic hash functions / Hashing / Cryptography / Sponge function / Gilles Van Assche / Joan Daemen / Hash function

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
14

Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen The NOEKEON

Add to Reading List

Source URL: gva.noekeon.org

Language: English - Date: 2013-02-27 15:26:38
    15

    Distinguishing Stream Ciphers with Convolutional Filters Joan Daemen and Gilles Van Assche STMicroelectronics – Smart Cards ICs Division Excelsiorlaan 44–46, 1930 Zaventem, Belgium February 15, 2005

    Add to Reading List

    Source URL: gva.noekeon.org

    Language: English - Date: 2013-02-27 15:26:38
      16

      Producing Collisions for Panama, Instantaneously Joan Daemen and Gilles Van Assche STMicroelectronics, Zaventem, Belgium

      Add to Reading List

      Source URL: radiogatun.noekeon.org

      Language: English - Date: 2013-02-27 15:27:44
        17Cryptography / Block cipher / BaseKing / 3-Way / Key schedule / Linear cryptanalysis / Cryptanalysis / Data Encryption Standard / VEST / Advanced Encryption Standard / Weak key / Feistel cipher

        Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

        Add to Reading List

        Source URL: jda.noekeon.org

        Language: English - Date: 2013-08-28 07:53:16
        18Mathematics / Algebra / Differential calculus / Differential cryptanalysis / Block cipher / Differential / Vector space / Advanced Encryption Standard / Rebound attack

        Cryptogr Commun DOIs12095x New criteria for linear maps in AES-like ciphers Joan Daemen · Vincent Rijmen

        Add to Reading List

        Source URL: jda.noekeon.org

        Language: English - Date: 2013-08-28 07:53:32
        19

        Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers Mario Lamberger, Institute for Applied Information Processing and Communication, TU Graz Joint work with Joan Daemen, Nor

        Add to Reading List

        Source URL: www.math.tugraz.at

        Language: English - Date: 2008-07-29 07:57:21
          20Cryptography / Block ciphers / Advanced Encryption Standard / Vincent Rijmen / Symmetric-key algorithm / Joan Daemen / Data Encryption Standard / Key schedule / Q / ARIA / Cipher / Serpent

          PDF Document

          Add to Reading List

          Source URL: jda.noekeon.org

          Language: English - Date: 2013-09-20 15:54:41
          UPDATE