Joan Daemen

From MaRDI portal
(Redirected from Person:778890)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Mystrium: wide block encryption efficient on entry-level processors2025-01-10Paper
Propagation properties of a non-linear mapping based on squaring in odd characteristic
Cryptography and Communications
2024-11-26Paper
Multimixer-156: universal keyed hashing based on integer multiplication and cyclic shift2024-10-23Paper
ACE-HoT: \underline{A}ccelerating an extreme amount of symmetric \underline{C}ipher \underline{E}valuations for (\underline{H}igh-\underline{o}rder) avalanche \underline{T}ests2024-10-16Paper
Algebraic properties of the maps \(\chi_n\)
Designs, Codes and Cryptography
2024-08-13Paper
The state diagram of $$\chi $$
Designs, Codes and Cryptography
2024-05-08Paper
Universal hashing based on field multiplication and (near-)MDS matrices
Progress in Cryptology - AFRICACRYPT 2023
2024-02-02Paper
Twin column parity mixers and Gaston. A new mixing layer and permutation
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
On the security of keyed hashing based on public permutations
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Differential and linear properties of vectorial Boolean functions based on chi
Cryptography and Communications
2023-12-14Paper
Jammin' on the deck
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Weak subtweakeys in SKINNY
Lecture Notes in Computer Science
2023-08-14Paper
Online template attack on ECDSA: extracting keys via the other side
Progress in Cryptology - AFRICACRYPT 2020
2022-11-09Paper
Computing the distribution of differentials over the non-linear mapping \(\chi \)2022-07-13Paper
Thinking outside the superbox2022-04-22Paper
\textsc{Friet}: an authenticated encryption scheme with built-in fault detection2021-12-01Paper
The design of Rijndael. The Advanced Encryption Standard (AES)
Information Security and Cryptography
2020-07-20Paper
Changing of the guards: a simple and efficient method for achieving uniformity in threshold sharing
Lecture Notes in Computer Science
2020-06-24Paper
Breaking Ed25519 in WolfSSL2020-01-21Paper
Spectral characterization of iterating lossy mappings2018-10-26Paper
\textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\)2018-08-10Paper
The block cipher \textsc{Square}
Fast Software Encryption
2018-05-09Paper
Fast hashing and stream encryption with \textsc{Panama}
Fast Software Encryption
2018-05-09Paper
Full-state keyed duplex with built-in multi-user support2018-03-08Paper
scientific article; zbMATH DE number 6823395 (Why is no real title available?)2018-01-09Paper
The cipher SHARK
Fast Software Encryption
2017-11-15Paper
Security of Keyed Sponge Constructions Using a Modular Proof Approach
Fast Software Encryption
2015-09-18Paper
Correlation analysis in \(\mathrm{GF}(2^n)\)2014-08-07Paper
Sakura: a flexible coding for tree hashing
Applied Cryptography and Network Security
2014-07-07Paper
Keccak
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Differential Propagation Analysis of Keccak
Fast Software Encryption
2013-01-08Paper
Duplexing the sponge: Single-pass authenticated encryption and other applications
Selected Areas in Cryptography
2012-06-08Paper
Sponge-based pseudo-random number generators
Cryptographic Hardware and Embedded Systems, CHES 2010
2010-08-17Paper
New criteria for linear maps in AES-like ciphers
Cryptography and Communications
2009-10-26Paper
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers
Computing
2009-08-10Paper
Understanding Two-Round Differentials in AES
Lecture Notes in Computer Science
2008-11-27Paper
Distinguishing Stream Ciphers with Convolutional Filters
Lecture Notes in Computer Science
2008-11-27Paper
Producing Collisions for Panama, Instantaneously
Fast Software Encryption
2008-09-16Paper
On the Indifferentiability of the Sponge Construction
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Probability distributions of correlation and differentials in block ciphers
Journal of Mathematical Cryptology
2008-02-21Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
scientific article; zbMATH DE number 2086701 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 1955777 (Why is no real title available?)2003-07-29Paper
The Wide Trail Design Strategy
Cryptography and Coding
2002-11-25Paper
scientific article; zbMATH DE number 1759267 (Why is no real title available?)2002-10-01Paper
scientific article; zbMATH DE number 1682693 (Why is no real title available?)2001-12-17Paper
Linear frameworks for block ciphers
Designs, Codes and Cryptography
2001-02-18Paper
scientific article; zbMATH DE number 1504787 (Why is no real title available?)2000-09-12Paper
A new approach to block cipher design
Fast Software Encryption
2000-08-30Paper
scientific article; zbMATH DE number 1455107 (Why is no real title available?)2000-06-05Paper
scientific article; zbMATH DE number 1394322 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1024059 (Why is no real title available?)1997-12-15Paper
Limitations of the Even-Mansour construction
Advances in Cryptology — ASIACRYPT '91
1995-11-28Paper
scientific article; zbMATH DE number 697803 (Why is no real title available?)1995-01-08Paper
scientific article; zbMATH DE number 697836 (Why is no real title available?)1995-01-08Paper
Invertible shift-invariant transformations on binary arrays
Applied Mathematics and Computation
1994-09-12Paper


Research outcomes over time


This page was built for person: Joan Daemen