Joan Daemen

According to our database1, Joan Daemen authored at least 89 papers between 1985 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Protecting against Statistical Ineffective Fault Attacks.
IACR Cryptology ePrint Archive, 2019

2018
Column Parity Mixers.
IACR Trans. Symmetric Cryptol., 2018

Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
IACR Trans. Symmetric Cryptol., 2018

The design of Xoodoo and Xoofff.
IACR Trans. Symmetric Cryptol., 2018

Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection.
IACR Cryptology ePrint Archive, 2018

Xoodoo cookbook.
IACR Cryptology ePrint Archive, 2018

The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE.
IACR Cryptology ePrint Archive, 2018

Symmetric Cryptography (Dagstuhl Seminar 18021).
Dagstuhl Reports, 2018

Breaking Ed25519 in WolfSSL.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

KangarooTwelve: Fast Hashing Based on Keccak-p.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
New techniques for trail bounds and application to differential trails in Keccak.
IACR Trans. Symmetric Cryptol., 2017

Farfalle: parallel permutation-based cryptography.
IACR Trans. Symmetric Cryptol., 2017

Breaking Ed25519 in WolfSSL.
IACR Cryptology ePrint Archive, 2017

New techniques for trail bounds and application to differential trails in Keccak.
IACR Cryptology ePrint Archive, 2017

Full-State Keyed Duplex With Built-In Multi-User Support.
IACR Cryptology ePrint Archive, 2017

Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

DPA on hardware implementations of Ascon and Keyak.
Proceedings of the Computing Frontiers Conference, 2017

Full-State Keyed Duplex with Built-In Multi-user Support.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing.
IACR Cryptology ePrint Archive, 2016

Spectral characterization of iterating lossy mappings.
IACR Cryptology ePrint Archive, 2016

Farfalle: parallel permutation-based cryptography.
IACR Cryptology ePrint Archive, 2016

KangarooTwelve: fast hashing based on Keccak-p.
IACR Cryptology ePrint Archive, 2016

Spectral Characterization of Iterating Lossy Mappings.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

Exploring the use of shift register lookup tables for Keccak implementations on Xilinx FPGAs.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016

On Non-uniformity in Threshold Sharings.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

2015
Keccak.
IACR Cryptology ePrint Archive, 2015

Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

2014
Sufficient conditions for sound tree and sequential hashing modes.
Int. J. Inf. Sec., 2014

The Making of KECCAK.
Cryptologia, 2014

Sakura: A Flexible Coding for Tree Hashing.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Sakura: a flexible coding for tree hashing.
IACR Cryptology ePrint Archive, 2013

Power Analysis of Hardware Implementations Protected with Secret Sharing.
IACR Cryptology ePrint Archive, 2013

Keccak.
Proceedings of the Advances in Cryptology, 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Differential propagation analysis of Keccak.
IACR Cryptology ePrint Archive, 2012

Power analysis of hardware implementations protected with secret sharing.
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012

Differential Propagation Analysis of Keccak.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Rijndael.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Sufficient conditions for sound hashing using a truncated permutation.
IACR Cryptology ePrint Archive, 2011

Duplexing the sponge: single-pass authenticated encryption and other applications.
IACR Cryptology ePrint Archive, 2011

Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

2010
Refinements of the ALRED construction and MAC security claims.
IET Information Security, 2010

The First 10 Years of Advanced Encryption.
IEEE Security & Privacy, 2010

Sponge-Based Pseudo-Random Number Generators.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Codes and Provable Security of Ciphers - Extended abstract.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Sufficient conditions for sound tree and sequential hashing modes.
IACR Cryptology ePrint Archive, 2009

Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers.
Computing, 2009

New criteria for linear maps in AES-like ciphers.
Cryptography and Communications, 2009

The Road from Panama to Keccak via RadioGatún.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

Sufficient conditions for sound tree hashing modes.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
The Self-synchronizing Stream Cipher Moustique.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

On the Indifferentiability of the Sponge Construction.
Proceedings of the Advances in Cryptology, 2008

2007
Probability distributions of correlation and differentials in block ciphers.
J. Mathematical Cryptology, 2007

Plateau characteristics.
IET Information Security, 2007

Producing Collisions for Panama, Instantaneously.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Two-Round AES Differentials.
IACR Cryptology ePrint Archive, 2006

RadioGatún, a belt-and-mill hash function.
IACR Cryptology ePrint Archive, 2006

Understanding Two-Round Differentials in AES.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Distinguishing Stream Ciphers with Convolutional Filters.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

2005
Rijndael/AES.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Probability distributions of Correlation and Differentials in Block Ciphers.
IACR Cryptology ePrint Archive, 2005

The Pelican MAC Function.
IACR Cryptology ePrint Archive, 2005

Distinguishing Stream Ciphers with Convolutional Filters.
IACR Cryptology ePrint Archive, 2005

A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2002
Security of a Wide Trail Design.
Proceedings of the Progress in Cryptology, 2002

AES and the Wide Trail Design Strategy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

The Design of Rijndael: AES - The Advanced Encryption Standard
Information Security and Cryptography, Springer, ISBN: 978-3-642-07646-6, 2002

2001
Linear Frameworks for Block Ciphers.
Des. Codes Cryptogr., 2001

The Wide Trail Design Strategy.
Proceedings of the Cryptography and Coding, 2001

2000
Bitslice Ciphers and Power Analysis Attacks.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Rijndael for AES.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Efficient Block Ciphers for Smartcards.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

1998
Fast Hashing and Stream Encryption with PANAMA.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

The Banksys Signature Transport (BST) Protocol.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

The Block Cipher Rijndael.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

The Block Cipher BKSQ.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

1997
The Block Cipher Square.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Management of Secret Keys: Dynamic Key Handling.
Proceedings of the State of the Art in Applied Cryptography, 1997

1996
The Cipher SHARK.
Proceedings of the Fast Software Encryption, 1996

1994
Correlation Matrices.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

1993
Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip.
Proceedings of the Proceedings 1993 International Conference on Computer Design: VLSI in Computers & Processors, 1993

A New Approach to Block Cipher Design.
Proceedings of the Fast Software Encryption, 1993

Resynchronization Weaknesses in Synchronous Stream Ciphers.
Proceedings of the Advances in Cryptology, 1993

Weak Keys for IDEA.
Proceedings of the Advances in Cryptology, 1993

1992
A Hardware Design Model for Cryptographic Algorithms.
Proceedings of the Computer Security, 1992

1991
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton.
Proceedings of the Advances in Cryptology, 1991

Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91.
Proceedings of the Advances in Cryptology, 1991

Limitations of the Even-Mansour Construction.
Proceedings of the Advances in Cryptology, 1991

1985
Performance Analysis of Local Area Networks for Real Time Environments.
Proceedings of the Kommunikation in Verteilten Systemen II, 1985


  Loading...