Search Results - "Rijmen, V"
-
1
Low-Data Complexity Attacks on AES
Published in IEEE transactions on information theory (01-11-2012)“…The majority of current attacks on reduced-round variants of block ciphers seeks to maximize the number of rounds that can be broken, using less data than the…”
Get full text
Journal Article -
2
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO)
Published in Cryptologia (04-03-2019)“…Mathematical problems and their solutions from the fourth International Students' Olympiad in cryptography (NSUCRYPTO-2017) are presented. We consider problems…”
Get full text
Journal Article -
3
Analysis of the Hash Function Design Strategy Called SMASH
Published in IEEE transactions on information theory (01-08-2008)“…The hash function design strategy SMASH was recently proposed as an alternative to the MD4 family of hash functions. It can be shown that the strategy leads to…”
Get full text
Journal Article -
4
-
5
Editorial
Published in Computing (01-06-2009)“…Issue Title: Special Issue on the occasion of the 8th Central European Conference on Cryptography…”
Get full text
Journal Article -
6
On the Sixth International Olympiad in Cryptography NSUCRYPTO
Published in Journal of applied and industrial mathematics (01-11-2020)“…NSUCRYPTO is the unique cryptographic Olympiad containing scientific mathematical problems for professionals, school and university students from any country…”
Get full text
Journal Article -
7
-
8
On the Sixth International Olympiad in CryptographyNSUCRYPTO
Published in Journal of applied and industrial mathematics (01-01-2020)“…NSUCRYPTO is the unique cryptographic Olympiad containing scientific mathematical problems for professionals, school and university students from any country…”
Get full text
Journal Article -
9
Cryptography on smart cards
Published in Computer networks (Amsterdam, Netherlands : 1999) (16-07-2001)“…This article presents an overview of the cryptographic primitives that are commonly implemented on smart cards. We also discuss attacks that can be mounted on…”
Get full text
Journal Article -
10
The NIST Cryptographic Workshop on Hash Functions
Published in IEEE security & privacy (01-01-2006)“…In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to…”
Get full text
Magazine Article -
11
The Quantum Entanglement of Binary and Bipolar Sequences
Published 20-07-2001“…Sequences and Their Applications, SETA'01, Discrete Mathematics and Theoretical Computer Science Series, Springer, 2001, Ed.: T.Helleseth, P.V.Kumar and K.Yang…”
Get full text
Journal Article -
12
Toward a secure public-key blockwise fragile authentication watermarking
Published in Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205) (2001)“…In this paper, we describe some weaknesses of public-key blockwise fragile authentication watermarkings and the means to make them secure. Wong's (1998)…”
Get full text
Conference Proceeding -
13
Green Cryptography: Cleaner Engineering through Recycling, Part 2
Published in IEEE security & privacy (01-09-2009)“…In this paper we further defend our selection of the AES as a prime candidate for recycling, by looking at its underlying design strategy - the wide-trail…”
Get full text
Magazine Article