The following pages link to Joan Daemen (Q778890):
Displaying 50 items.
- The design of Rijndael. The Advanced Encryption Standard (AES) (Q778891) (← links)
- New criteria for linear maps in AES-like ciphers (Q1032487) (← links)
- Invertible shift-invariant transformations on binary arrays (Q1332378) (← links)
- \textsc{KangarooTwelve}: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\) (Q1656061) (← links)
- Full-state keyed duplex with built-in multi-user support (Q1703941) (← links)
- Linear frameworks for block ciphers (Q1841527) (← links)
- Spectral characterization of iterating lossy mappings (Q1989622) (← links)
- \textsc{Friet}: an authenticated encryption scheme with built-in fault detection (Q2055626) (← links)
- Thinking outside the superbox (Q2129002) (← links)
- Computing the distribution of differentials over the non-linear mapping \(\chi \) (Q2154056) (← links)
- Breaking Ed25519 in WolfSSL (Q2287502) (← links)
- Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers (Q2390943) (← links)
- (Q2760977) (← links)
- Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications (Q2889879) (← links)
- Security of Keyed Sponge Constructions Using a Modular Proof Approach (Q2946951) (← links)
- Producing Collisions for Panama, Instantaneously (Q3524878) (← links)
- Understanding Two-Round Differentials in AES (Q3541880) (← links)
- Distinguishing Stream Ciphers with Convolutional Filters (Q3541892) (← links)
- Sponge-Based Pseudo-Random Number Generators (Q3583439) (← links)
- (Q4314019) (← links)
- (Q4314054) (← links)
- Limitations of the Even-Mansour construction (Q4314059) (← links)
- (Q4341750) (← links)
- (Q4417387) (← links)
- (Q4484903) (← links)
- A new approach to block cipher design (Q4499389) (← links)
- (Q4502744) (← links)
- (Q4537988) (← links)
- The Wide Trail Design Strategy (Q4550270) (← links)
- The cipher SHARK (Q4593788) (← links)
- (Q4602279) (← links)
- The block cipher Square (Q4639337) (← links)
- Fast Hashing and Stream Encryption with Panama (Q4639441) (← links)
- (Q4737238) (← links)
- Differential Propagation Analysis of Keccak (Q4899718) (← links)
- Keccak (Q4924418) (← links)
- (Q4934738) (← links)
- Online Template Attack on ECDSA: (Q5048978) (← links)
- Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing (Q5114631) (← links)
- Sakura: A Flexible Coding for Tree Hashing (Q5168543) (← links)
- Probability distributions of correlation and differentials in block ciphers (Q5443535) (← links)
- On the Indifferentiability of the Sponge Construction (Q5458592) (← links)
- Fast Software Encryption (Q5473576) (← links)
- (Q5495952) (← links)
- Differential and linear properties of vectorial Boolean functions based on chi (Q6088855) (← links)
- The state diagram of $$\chi $$ (Q6499104) (← links)
- Algebraic properties of the maps \(\chi_n\) (Q6587208) (← links)
- ACE-HoT: \underline{A}ccelerating an extreme amount of symmetric \underline{C}ipher \underline{E}valuations for (\underline{H}igh-\underline{o}rder) avalanche \underline{T}ests (Q6619921) (← links)
- Multimixer-156: universal keyed hashing based on integer multiplication and cyclic shift (Q6623290) (← links)
- Propagation properties of a non-linear mapping based on squaring in odd characteristic (Q6643243) (← links)