Gilles Van Assche

Affiliations:
  • STMicroelectronics, Diegem, Belgium


According to our database1, Gilles Van Assche authored at least 40 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Committing authenticated encryption based on SHAKE.
IACR Cryptol. ePrint Arch., 2023

TurboSHAKE.
IACR Cryptol. ePrint Arch., 2023

2022
Tighter trail bounds for Xoodoo.
IACR Cryptol. ePrint Arch., 2022

Jammin' on the deck.
IACR Cryptol. ePrint Arch., 2022

2021
Thinking Outside the Superbox.
IACR Cryptol. ePrint Arch., 2021

2020
Xoodyak, a lightweight cryptographic scheme.
IACR Trans. Symmetric Cryptol., 2020

2018
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
IACR Trans. Symmetric Cryptol., 2018

The design of Xoodoo and Xoofff.
IACR Trans. Symmetric Cryptol., 2018

Xoodoo cookbook.
IACR Cryptol. ePrint Arch., 2018

The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE.
IACR Cryptol. ePrint Arch., 2018

KangarooTwelve: Fast Hashing Based on Keccak-p.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Farfalle: parallel permutation-based cryptography.
IACR Trans. Symmetric Cryptol., 2017

New techniques for trail bounds and application to differential trails in Keccak.
IACR Cryptol. ePrint Arch., 2017

Full-State Keyed Duplex With Built-In Multi-User Support.
IACR Cryptol. ePrint Arch., 2017

2016
Farfalle: parallel permutation-based cryptography.
IACR Cryptol. ePrint Arch., 2016

KangarooTwelve: fast hashing based on Keccak-p.
IACR Cryptol. ePrint Arch., 2016

2015
Keccak.
IACR Cryptol. ePrint Arch., 2015

Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Sufficient conditions for sound tree and sequential hashing modes.
Int. J. Inf. Sec., 2014

The Making of KECCAK.
Cryptologia, 2014

2013
Sakura: a flexible coding for tree hashing.
IACR Cryptol. ePrint Arch., 2013

Power Analysis of Hardware Implementations Protected with Secret Sharing.
IACR Cryptol. ePrint Arch., 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Differential propagation analysis of Keccak.
IACR Cryptol. ePrint Arch., 2012

Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices.
IACR Cryptol. ePrint Arch., 2012

2011
Sufficient conditions for sound hashing using a truncated permutation.
IACR Cryptol. ePrint Arch., 2011

Duplexing the sponge: single-pass authenticated encryption and other applications.
IACR Cryptol. ePrint Arch., 2011

2010
Sponge-Based Pseudo-Random Number Generators.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
The Road from Panama to Keccak via RadioGatún.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

Sufficient conditions for sound tree hashing modes.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
On the Indifferentiability of the Sponge Construction.
Proceedings of the Advances in Cryptology, 2008

2007
Producing Collisions for Panama, Instantaneously.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
RadioGatún, a belt-and-mill hash function.
IACR Cryptol. ePrint Arch., 2006

Quantum cryptography and secret-key distillation.
Cambridge University Press, ISBN: 978-0-521-86485-5, 2006

2005
Distinguishing Stream Ciphers with Convolutional Filters.
IACR Cryptol. ePrint Arch., 2005

2004
Reconciliation of a quantum-distributed Gaussian key.
IEEE Trans. Inf. Theory, 2004

Side-Information Coding with Turbo Codes and its Application to Quantum Key Distribution
CoRR, 2004

On minimum entropy graph colorings.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
Construction of a shared secret key using continuous variables.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

2000
Bitslice Ciphers and Power Analysis Attacks.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000


  Loading...