Vincent Rijmen

From MaRDI portal
Person:522207

Available identifiers

zbMath Open rijmen.vincentDBLPr/VincentRijmenWikidataQ433933 ScholiaQ433933MaRDI QIDQ522207

List of research outcomes





PublicationDate of PublicationType
An optimal universal construction for the threshold implementation of bijective S-boxes2024-07-19Paper
RAMus- a new lightweight block cipher for RAM encryption2023-07-25Paper
Differential cryptanalysis in the fixed-key model2023-06-30Paper
A bit-vector differential model for the modular addition by a constant2023-03-21Paper
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis2022-08-04Paper
On the Sixth International Olympiad in Cryptography NSUCRYPTO2022-07-15Paper
Cryptanalysis of the permutation based algorithm SpoC2022-07-06Paper
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK2021-09-06Paper
Rotational cryptanalysis on MAC algorithm chaskey2021-02-23Paper
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY2021-02-15Paper
The phantom of differential characteristics2020-10-21Paper
The design of Rijndael. The Advanced Encryption Standard (AES)2020-07-20Paper
Revisiting the wrong-key-randomization hypothesis2020-04-28Paper
Correlation distribution analysis of a two-round key-alternating block cipher2019-09-30Paper
Decomposition of permutations in a finite field2019-05-15Paper
Constructions of S-boxes with uniform sharing2019-05-15Paper
A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\)2019-05-10Paper
Nonlinear diffusion layers2018-10-10Paper
New observations on invariant subspace attack2018-07-17Paper
The block cipher \textsc{Square}2018-05-09Paper
A family of trapdoor ciphers2018-05-09Paper
On the design and security of RC22018-05-09Paper
Differential Cryptanalysis of the ICE Encryption Algorithm2018-05-09Paper
Masking AES with \(d+1\) shares in hardware2018-02-14Paper
The cipher SHARK2017-11-15Paper
Low-Data Complexity Attacks on AES2017-06-08Paper
A new counting method to bound the number of active S-boxes in Rijndael and 3D2017-04-13Paper
On linear hulls and trails2016-12-21Paper
New insights on AES-like SPN ciphers2016-11-30Paper
Automatic search of linear trails in ARX with applications to SPECK and Chaskey2016-10-04Paper
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis2016-09-09Paper
Links among impossible differential, integral and zero correlation linear cryptanalysis2015-12-10Paper
Extracts from the SHA-3 competition2015-12-04Paper
Threshold implementations of small S-boxes2015-11-18Paper
Ciphertext-only attack on Akelarre2015-11-13Paper
ALE: AES-based lightweight authenticated encryption2015-09-18Paper
A new classification of 4-bit optimal S-boxes and its application to PRESENT, RECTANGLE and SPONGENT2015-09-18Paper
Collision attack on 5 rounds of Grøstl2015-09-18Paper
Cryptanalysis of reduced-round SIMON32 and SIMON482015-09-10Paper
The rebound attack and subspace distinguishers: application to Whirlpool2015-05-12Paper
Higher-Order Threshold Implementations2015-01-06Paper
Collision attack on the Hamsi-256 compression function2014-08-20Paper
Correlation analysis in \(\mathrm{GF}(2^n)\)2014-08-07Paper
A more efficient AES threshold implementation2014-06-24Paper
Linear hulls with correlation zero and linear cryptanalysis of block ciphers2014-03-17Paper
Key difference invariant bias in block ciphers2013-12-10Paper
Improved impossible differential attacks on large-block Rijndael2013-06-04Paper
Differential analysis of the LED block cipher2013-03-19Paper
Collisions for the WIDEA-8 compression function2013-03-18Paper
Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes2012-11-13Paper
Memoryless near-collisions via coding theory2012-02-15Paper
Secure hardware implementation of nonlinear functions in the presence of glitches2012-01-18Paper
Optimal covering codes for finding near-collisions2011-03-15Paper
Improved impossible differential cryptanalysis of 7-round AES-1282010-12-07Paper
Whirlwind: a new cryptographic hash function2010-09-16Paper
Rebound attack on reduced-round versions of JH2010-07-13Paper
Rotation symmetry in algebraically generated cryptographic substitution tables2010-04-19Paper
Numerical solvers and cryptanalysis2010-02-05Paper
Rebound distinguishers: results on the full Whirlpool compression function2009-12-15Paper
New criteria for linear maps in AES-like ciphers2009-10-26Paper
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers2009-08-10Paper
Analysis of Step-Reduced SHA-2562009-04-02Paper
The Impact of Carries on the Complexity of Collision Attacks on SHA-12009-04-02Paper
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches2009-03-24Paper
Second Preimages for Iterated Hash Functions and Their Implications on MACs2009-03-06Paper
Analysis of the Hash Function Design Strategy Called SMASH2009-02-24Paper
Understanding Two-Round Differentials in AES2008-11-27Paper
Using Normal Bases for Compact Hardware Implementations of the AES S-Box2008-11-20Paper
Threshold Implementations Against Side-Channel Attacks and Glitches2008-11-11Paper
On the Collision Resistance of RIPEMD-1602008-06-17Paper
Correlated Keystreams in Moustique2008-06-13Paper
Known-Key Distinguishers for Some Block Ciphers2008-05-15Paper
Cryptanalysis of the Tiger Hash Function2008-05-15Paper
Colliding Message Pair for 53-Step HAS-1602008-05-06Paper
Weaknesses in the HAS-V Compression Function2008-05-06Paper
Second Preimages for SMASH2008-04-17Paper
Update on Tiger2008-04-11Paper
On Authentication with HMAC and Non-random Properties2008-03-07Paper
Probability distributions of correlation and differentials in block ciphers2008-02-21Paper
Impact of Rotations in SHA-1 and Related Hash Functions2007-11-15Paper
Breaking a New Hash Function Design Strategy Called SMASH2007-11-15Paper
Cryptography and Coding2006-11-01Paper
Fast Software Encryption2006-06-22Paper
Fast Software Encryption2006-06-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Advanced Encryption Standard – AES2005-09-14Paper
Producing Collisions for PANAMA2004-08-12Paper
Differential Cryptanalysis of Q2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47372382004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44173872003-07-29Paper
The Wide Trail Design Strategy2002-11-25Paper
https://portal.mardi4nfdi.de/entity/Q44216412002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q27609772001-12-17Paper
Linear frameworks for block ciphers2001-02-18Paper
https://portal.mardi4nfdi.de/entity/Q45027352000-11-07Paper
https://portal.mardi4nfdi.de/entity/Q45024832000-10-30Paper
https://portal.mardi4nfdi.de/entity/Q44848972000-06-05Paper
https://portal.mardi4nfdi.de/entity/Q44848962000-06-05Paper
https://portal.mardi4nfdi.de/entity/Q49418052000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49418022000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42508272000-02-01Paper
Analysis Methods for (Alleged) RC41999-06-17Paper
On weaknesses of non-surjective round functions1998-01-07Paper
https://portal.mardi4nfdi.de/entity/Q43417491997-06-18Paper

Research outcomes over time

This page was built for person: Vincent Rijmen