Joan Daemen

Results: 53



#Item
1Physics / Quantum field theory / Quantum mechanics / Parity

Column Parity Mixers Ko Stoffelen and Joan Daemen Diffusion 2/17

Add to Reading List

Source URL: ko.stoffelen.nl

Language: English - Date: 2018-03-09 10:21:56
2Cryptography / Cryptographic hash functions / Search algorithms / Pattern matching / Backtracking / Hash function / Sponge function / Block cipher / SHA-3 / SHA-1 / Stack / Regular expression

The making of K Guido Bertoni1 , Joan Daemen1 , Michaël Peeters2 and Gilles Van Assche1 1 STMicroelectronics {guido.bertoni,joan.daemen,gilles.vanassche}@st.com

Add to Reading List

Source URL: keccak.team

Language: English - Date: 2017-08-25 12:32:25
3

Fonctionnement d’AES 1 Présentation du système AES Le système de chiffrement à clé secrète AES est un système basé sur le système Rijdndael construit par Joan Daemen et Vincent Rijmen. Pour AES les blocs de do

Add to Reading List

Source URL: www.acrypta.com

Language: French - Date: 2006-07-13 15:21:18
    4

    Block ciphers and AES Cryptology, 2016 Autumn Joan Daemen Institute for Computing and Information Sciences Radboud University September 27, 2016

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2016-09-27 22:29:12
      5

      Differential propagation analysis of K Joan Daemen and Gilles Van Assche STMicroelectronics Abstract. In this paper we introduce new concepts that help read and understand low-weight differential trails in K

      Add to Reading List

      Source URL: keccak.team

      Language: English - Date: 2017-08-22 12:54:44
        6Algebra / Mathematics / Linear algebra / Vectors / Matrix theory / Trace / Covariance and correlation / Dimension / Differential cryptanalysis / Degrees of freedom / Matrix / Correlation and dependence

        Correlation Analysis in GF(2𝑛) Joan DAEMEN a and Vincent RIJMEN b a STMicroelectronics, Belgium b Dept. of Electrical Engineering/ESAT, K.U.Leuven and IBBT and IAIK, Graz

        Add to Reading List

        Source URL: jda.noekeon.org

        Language: English - Date: 2013-08-28 07:53:29
        7Cryptography / Block ciphers / NOEKEON / Gilles Van Assche / Joan Daemen / BaseKing / Vincent Rijmen / Advanced Encryption Standard / Linear cryptanalysis / International Data Encryption Algorithm / Interpolation attack / Panama

        Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen The NOEKEON

        Add to Reading List

        Source URL: jda.noekeon.org

        Language: English - Date: 2013-08-28 07:53:16
        8Computer access control / Cryptography / Computer security / Economy / EMV / Smart card / Authentication / Challengeresponse authentication / Transaction authentication number

        The Banksys Signature Transport (BST) Protocol Michel Dawirs and Joan Daemen Proton World Int.l, Rue du Planeur 10, B-1130 Brussels , Abstract. This document describes a

        Add to Reading List

        Source URL: jda.noekeon.org

        Language: English - Date: 2013-08-28 07:53:39
        9Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

        Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

        Add to Reading List

        Source URL: keccak.noekeon.org

        Language: English - Date: 2013-02-27 15:26:40
        10Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

        Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

        Add to Reading List

        Source URL: keccak.noekeon.org

        Language: English - Date: 2013-02-27 15:26:40
        UPDATE