Search Results - "Rijmen, V."

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Low-Data Complexity Attacks on AES by Bouillaguet, C., Derbez, P., Dunkelman, O., Fouque, P., Keller, N., Rijmen, V.

    Published in IEEE transactions on information theory (01-11-2012)
    “…The majority of current attacks on reduced-round variants of block ciphers seeks to maximize the number of rounds that can be broken, using less data than the…”
    Get full text
    Journal Article
  2. 2

    Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO) by Gorodilova, A., Agievich, S., Carlet, C., Gorkunov, E., Idrisova, V., Kolomeec, N., Kutsenko, A., Nikova, S., Oblaukhov, A., Picek, S., Preneel, B., Rijmen, V., Tokareva, N.

    Published in Cryptologia (04-03-2019)
    “…Mathematical problems and their solutions from the fourth International Students' Olympiad in cryptography (NSUCRYPTO-2017) are presented. We consider problems…”
    Get full text
    Journal Article
  3. 3

    Analysis of the Hash Function Design Strategy Called SMASH by Lamberger, M., Pramstaller, N., Rechberger, C., Rijmen, V.

    Published in IEEE transactions on information theory (01-08-2008)
    “…The hash function design strategy SMASH was recently proposed as an alternative to the MD4 family of hash functions. It can be shown that the strategy leads to…”
    Get full text
    Journal Article
  4. 4

    Editorial by Heuberger, C., Rijmen, V.

    Published in Computing (01-06-2009)
    Get full text
    Journal Article
  5. 5

    Editorial by Heuberger, C, Rijmen, V

    Published in Computing (01-06-2009)
    “…Issue Title: Special Issue on the occasion of the 8th Central European Conference on Cryptography…”
    Get full text
    Journal Article
  6. 6

    On the Sixth International Olympiad in Cryptography NSUCRYPTO by Gorodilova, A. A., Tokareva, N. N., Agievich, S. V., Carlet, C., Gorkunov, E. V., Idrisova, V. A., Kolomeec, N. A., Kutsenko, A. V., Lebedev, R. K., Nikova, S., Oblaukhov, A. K., Pankratova, I. A., Pudovkina, M. A., Rijmen, V., Udovenko, A. N.

    “…NSUCRYPTO is the unique cryptographic Olympiad containing scientific mathematical problems for professionals, school and university students from any country…”
    Get full text
    Journal Article
  7. 7

    Editorial by Heuberger, C., Rijmen, V.

    Published in Computing (2009)
    Get full text
    Journal Article
  8. 8

    On the Sixth International Olympiad in CryptographyNSUCRYPTO by Gorodilova, A A, Tokareva, N N, Agievich, S V, Carlet, C, Gorkunov, E V, Idrisova, V A, Kolomeec, N A, Kutsenko, A V, Lebedev, R K, Nikova, S, Oblaukhov, A K, Pankratova, I A, Pudovkina, M A, Rijmen, V, Udovenko, A N

    “…NSUCRYPTO is the unique cryptographic Olympiad containing scientific mathematical problems for professionals, school and university students from any country…”
    Get full text
    Journal Article
  9. 9

    Cryptography on smart cards by Borst, Johan, Preneel, Bart, Rijmen, Vincent

    “…This article presents an overview of the cryptographic primitives that are commonly implemented on smart cards. We also discuss attacks that can be mounted on…”
    Get full text
    Journal Article
  10. 10

    The NIST Cryptographic Workshop on Hash Functions by Rechberger, C., Rijmen, V., Sklavos, N.

    Published in IEEE security & privacy (01-01-2006)
    “…In light of recent breakthroughs on the cryptanalysis of hash functions, the US National Institute for Standards and Technology (NIST) organized a workshop to…”
    Get full text
    Magazine Article
  11. 11

    The Quantum Entanglement of Binary and Bipolar Sequences by Parker, M. G, Rijmen, V

    Published 20-07-2001
    “…Sequences and Their Applications, SETA'01, Discrete Mathematics and Theoretical Computer Science Series, Springer, 2001, Ed.: T.Helleseth, P.V.Kumar and K.Yang…”
    Get full text
    Journal Article
  12. 12

    Toward a secure public-key blockwise fragile authentication watermarking by Barreto, P.S.L.M., Hae Yong Kim, Rijmen, V.

    “…In this paper, we describe some weaknesses of public-key blockwise fragile authentication watermarkings and the means to make them secure. Wong's (1998)…”
    Get full text
    Conference Proceeding
  13. 13

    Green Cryptography: Cleaner Engineering through Recycling, Part 2 by Troutman, Justin, Rijmen, Vincent

    Published in IEEE security & privacy (01-09-2009)
    “…In this paper we further defend our selection of the AES as a prime candidate for recycling, by looking at its underlying design strategy - the wide-trail…”
    Get full text
    Magazine Article