Vincent Rijmen

According to our database1, Vincent Rijmen authored at least 172 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
M&M: Masks and Macs against Physical Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

A new matrix form to generate all 3 × 3 involutory MDS matrices over F2m.
Inf. Process. Lett., 2019

Division cryptanalysis of block ciphers with a binary diffusion layer.
IET Information Security, 2019

Threshold Implementations in the Robust Probing Model.
IACR Cryptology ePrint Archive, 2019

Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019

Constructions of S-boxes with uniform sharing.
Cryptography and Communications, 2019

Decomposition of permutations in a finite field.
Cryptography and Communications, 2019

2018
Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

New observations on invariant subspace attack.
Inf. Process. Lett., 2018

Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography.
IET Information Security, 2018

Constructions of S-boxes with uniform sharing.
IACR Cryptology ePrint Archive, 2018

Decomposition of Permutations in a Finite Field.
IACR Cryptology ePrint Archive, 2018

M&M: Masks and Macs against Physical Attacks.
IACR Cryptology ePrint Archive, 2018

Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness.
IACR Cryptology ePrint Archive, 2018

Nonlinear diffusion layers.
Des. Codes Cryptogr., 2018

Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs.
SCIENCE CHINA Information Sciences, 2018

VerMI: Verification Tool for Masked Implementations.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

2017
Efficient methods to generate cryptographically significant binary diffusion layers.
IET Information Security, 2017

Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer.
IACR Cryptology ePrint Archive, 2017

New Observations on Invariant Subspace Attack.
IACR Cryptology ePrint Archive, 2017

VerMI: Verification Tool for Masked Implementations.
IACR Cryptology ePrint Archive, 2017

Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Cryptology ePrint Archive, 2017

A new counting method to bound the number of active S-boxes in Rijndael and 3D.
Des. Codes Cryptogr., 2017

Does Coupling Affect the Security of Masked Implementations?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

2016
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis.
IACR Cryptology ePrint Archive, 2016

New Insights on AES-like SPN Ciphers.
IACR Cryptology ePrint Archive, 2016

On the division property of S-boxes.
IACR Cryptology ePrint Archive, 2016

Masking AES with d+1 Shares in Hardware.
IACR Cryptology ePrint Archive, 2016

Does Coupling Affect the Security of Masked Implementations?
IACR Cryptology ePrint Archive, 2016

On Linear Hulls and Trails in Simon.
IACR Cryptology ePrint Archive, 2016

Revisiting the Wrong-Key-Randomization Hypothesis.
IACR Cryptology ePrint Archive, 2016

On Linear Hulls and Trails.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

Improved Fault Analysis on SIMON Block Cipher Family.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

New Insights on AES-Like SPN Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Masking AES with d+1 Shares in Hardware.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Theory of Implementation Security Workshop (TIs 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool.
J. Cryptology, 2015

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT.
IACR Cryptology ePrint Archive, 2015

Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
IACR Cryptology ePrint Archive, 2015

Problems, solutions and experience of the first international student's Olympiad in cryptography.
IACR Cryptology ePrint Archive, 2015

RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms.
SCIENCE CHINA Information Sciences, 2015

Threshold implementations of small S-boxes.
Cryptography and Communications, 2015

A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms.
IACR Cryptology ePrint Archive, 2014

Cryptanalysis of Reduced-round SIMON32 and SIMON48.
IACR Cryptology ePrint Archive, 2014

Collision Attack on 5 Rounds of Grøstl.
IACR Cryptology ePrint Archive, 2014

Higher-Order Threshold Implementations.
IACR Cryptology ePrint Archive, 2014

Linear hulls with correlation zero and linear cryptanalysis of block ciphers.
Des. Codes Cryptogr., 2014

Cryptanalysis of Reduced-Round SIMON32 and SIMON48.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Collision Attack on 5 Rounds of Grøstl.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

Higher-Order Threshold Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

A More Efficient AES Threshold Implementation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Mackerel: A Progressive School of Cryptographic Thought.
;login:, 2013

A More Efficient AES Threshold Implementation.
IACR Cryptology ePrint Archive, 2013

ALE: AES-Based Lightweight Authenticated Encryption.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Collisions for the WIDEA-8 Compression Function.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

Key Difference Invariant Bias in Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Low-Data Complexity Attacks on AES.
IEEE Trans. Information Theory, 2012

Differential Analysis of the LED Block Cipher.
IACR Cryptology ePrint Archive, 2012

Threshold Implementations of all 3x3 and 4x4 S-boxes.
IACR Cryptology ePrint Archive, 2012

Memoryless near-collisions via coding theory.
Des. Codes Cryptogr., 2012

Extracts from the SHA-3 Competition.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Collision Attack on the Hamsi-256 Compression Function.
Proceedings of the Progress in Cryptology, 2012

Improved Impossible Differential Attacks on Large-Block Rijndael.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

A Simple Key-Recovery Attack on McOE-X.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Differential Analysis of the LED Block Cipher.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Rijndael.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Whirlpool.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches.
J. Cryptology, 2011

Zero-Correlation Linear Cryptanalysis of Block Ciphers.
IACR Cryptology ePrint Archive, 2011

2010
Algebraic cryptanalysis of a small-scale version of stream cipher Lex.
IET Information Security, 2010

Refinements of the ALRED construction and MAC security claims.
IET Information Security, 2010

The First 10 Years of Advanced Encryption.
IEEE Security & Privacy, 2010

Practical-Titled Attack on AES-128 Using Chosen-Text Relations.
IACR Cryptology ePrint Archive, 2010

The Rebound Attack and Subspace Distinguishers: Application to Whirlpool.
IACR Cryptology ePrint Archive, 2010

Low Data Complexity Attacks on AES.
IACR Cryptology ePrint Archive, 2010

Whirlwind: a new cryptographic hash function.
Des. Codes Cryptogr., 2010

Optimal Covering Codes for Finding Near-Collisions.
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010

Improved Impossible Differential Cryptanalysis of 7-Round AES-128.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Rebound Attack on Reduced-Round Versions of JH.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Codes and Provable Security of Ciphers - Extended abstract.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Numerical solvers and cryptanalysis.
J. Mathematical Cryptology, 2009

Green Cryptography: Cleaner Engineering through Recycling, Part 2.
IEEE Security & Privacy, 2009

Green Cryptography: Cleaner Engineering through Recycling.
IEEE Security & Privacy, 2009

Editorial.
Computing, 2009

Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers.
Computing, 2009

New criteria for linear maps in AES-like ciphers.
Cryptography and Communications, 2009

Rebound Distinguishers: Results on the Full Whirlpool Compression Function.
Proceedings of the Advances in Cryptology, 2009

2008
Analysis of the Hash Function Design Strategy Called SMASH.
IEEE Trans. Information Theory, 2008

New Results on NMAC/HMAC when Instantiated with Popular Hash Functions.
J. UCS, 2008

Rotation symmetry in algebraically generated cryptographic substitution tables.
Inf. Process. Lett., 2008

Analysis of Step-Reduced SHA-256.
IACR Cryptology ePrint Archive, 2008

Using Normal Bases for Compact Hardware Implementations of the AES S-Box.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.
Proceedings of the Information Security and Cryptology, 2008

Correlated Keystreams in Moustique.
Proceedings of the Progress in Cryptology, 2008

2007
Probability distributions of correlation and differentials in block ciphers.
J. Mathematical Cryptology, 2007

Plateau characteristics.
IET Information Security, 2007

Weaknesses in the HAS-V Compression Function.
Proceedings of the Information Security and Cryptology, 2007

Colliding Message Pair for 53-Step HAS-160.
Proceedings of the Information Security and Cryptology, 2007

On Authentication with HMAC and Non-random Properties.
Proceedings of the Financial Cryptography and Data Security, 2007

07021 Abstracts Collection -- Symmetric Cryptography.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

07021 Executive Summary -- Symmetric Cryptography.
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007

Second Preimages for SMASH.
Proceedings of the Topics in Cryptology, 2007

Cryptanalysis of the Tiger Hash Function.
Proceedings of the Advances in Cryptology, 2007

Known-Key Distinguishers for Some Block Ciphers.
Proceedings of the Advances in Cryptology, 2007

Second Preimages for Iterated Hash Functions and Their Implications on MACs.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
The NIST Cryptographic Workshop on Hash Functions.
IEEE Security & Privacy, 2006

On Authentication with HMAC and Non-Random Properties.
IACR Cryptology ePrint Archive, 2006

Second Preimages for Iterated Hash Functions Based on a b-Block Bypass.
IACR Cryptology ePrint Archive, 2006

Two-Round AES Differentials.
IACR Cryptology ePrint Archive, 2006

Understanding Two-Round Differentials in AES.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

On the Collision Resistance of RIPEMD-160.
Proceedings of the Information Security, 9th International Conference, 2006

Update on Tiger.
Proceedings of the Progress in Cryptology, 2006

Threshold Implementations Against Side-Channel Attacks and Glitches.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

The Impact of Carries on the Complexity of Collision Attacks on SHA-1.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

Analysis of Step-Reduced SHA-256.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

A compact FPGA implementation of the hash function whirlpool.
Proceedings of the ACM/SIGDA 14th International Symposium on Field Programmable Gate Arrays, 2006

2005
Rijndael/AES.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Update on SHA-1.
IACR Cryptology ePrint Archive, 2005

Probability distributions of Correlation and Differentials in Block Ciphers.
IACR Cryptology ePrint Archive, 2005

The Pelican MAC Function.
IACR Cryptology ePrint Archive, 2005

Analysis of simplified variants of SHA-256.
Proceedings of the WEWoRC 2005, 2005

Impact of Rotations in SHA-1 and Related Hash Functions.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Breaking a New Hash Function Design Strategy Called SMASH.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Exploiting Coding Theory for Collision Attacks on SHA-1.
Proceedings of the Cryptography and Coding, 2005

A Side-Channel Analysis Resistant Description of the AES S-Box.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Update on SHA-1.
Proceedings of the Topics in Cryptology, 2005

2004
Proving Key Usage.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Periodic Properties of Counter Assisted Stream Ciphers.
Proceedings of the Topics in Cryptology, 2004

Representations and Rijndael Descriptions.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
The MESH Block Ciphers.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

2002
Security of a Wide Trail Design.
Proceedings of the Progress in Cryptology, 2002

AES and the Wide Trail Design Strategy.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

The Design of Rijndael: AES - The Advanced Encryption Standard
Information Security and Cryptography, Springer, ISBN: 978-3-642-07646-6, 2002

2001
Linear Frameworks for Block Ciphers.
Des. Codes Cryptogr., 2001

Cryptography on smart cards.
Computer Networks, 2001

The Quantum Entanglement of Binary and Bipolar Sequences.
Proceedings of the Sequences and their Applications, 2001

The Wide Trail Design Strategy.
Proceedings of the Cryptography and Coding, 2001

Toward a secure public-key blockwise fragile authentication watermarking.
Proceedings of the 2001 International Conference on Image Processing, 2001

Producing Collisions for PANAMA.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Differential Cryptanalysis of Q.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Improved SQUARE Attacks against Reduced-Round HIEROCRYPT.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

2000
Ciphertext-only Attack on Akelarre.
Cryptologia, 2000

Rijndael for AES.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Efficient Block Ciphers for Smartcards.
Proceedings of the 1st Workshop on Smartcard Technology, 1999

On the Decorrelated Fast Cipher (DFC) and Its Theory.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Attack on Six Rounds of Crypton.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Equivalent Keys of HPC.
Proceedings of the Advances in Cryptology, 1999

1998
Cryptanalysis of SPEED.
Proceedings of the Selected Areas in Cryptography '98, 1998

Differential Cryptanalysis of the ICE Encryption Algorithm.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

On the Design and Security of RC2.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

The Block Cipher Rijndael.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

The Block Cipher BKSQ.
Proceedings of the Smart Card Research and Applications, This International Conference, 1998

Analysis Methods for (Alleged) RC4.
Proceedings of the Advances in Cryptology, 1998

1997
On Weaknesses of Non-surjective Round Functions.
Des. Codes Cryptogr., 1997

A Family of Trapdoor Ciphers.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

The Block Cipher Square.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Two Attacks on Reduced IDEA.
Proceedings of the Advances in Cryptology, 1997

Recent Developments in the Design of Conventional Cryptographic Algorithms.
Proceedings of the State of the Art in Applied Cryptography, 1997

1996
The Cipher SHARK.
Proceedings of the Fast Software Encryption, 1996

1994
Cryptanalysis of McGuffin.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

1993
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds.
Proceedings of the Advances in Cryptology, 1993


  Loading...