Search Results - "Rijmen, Vincent"

Refine Results
  1. 1
  2. 2

    Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches by Nikova, Svetla, Rijmen, Vincent, Schläffer, Martin

    Published in Journal of cryptology (01-04-2011)
    “…Hardware implementations of cryptographic algorithms are vulnerable to side-channel attacks. Side-channel attacks that are based on multiple measurements of…”
    Get full text
    Journal Article
  3. 3

    Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK by Sadeghi, Sadegh, Rijmen, Vincent, Bagheri, Nasour

    Published in Designs, codes, and cryptography (01-09-2021)
    “…Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in…”
    Get full text
    Journal Article
  4. 4

    Revisiting the Wrong-Key-Randomization Hypothesis by Ashur, Tomer, Beyne, Tim, Rijmen, Vincent

    Published in Journal of cryptology (01-04-2020)
    “…Linear cryptanalysis is considered to be one of the strongest techniques in the cryptanalyst’s arsenal. In most cases, Matsui’s Algorithm 2 is used for the key…”
    Get full text
    Journal Article
  5. 5

    PPP/PPP-RTK Message Authentication by Fernandez-Hernandez, Ignacio, Hirokawa, Rui, Rijmen, Vincent, Aikawa, Yusuke

    Published in Navigation (Washington) (01-01-2023)
    “…This paper analyzes candidate schemes for PPP/PPP-RTK (precise point positioning/real-time kinematic) data authentication. Asymmetric schemes are proposed…”
    Get full text
    Journal Article
  6. 6

    New Key-Recovery Attack on Reduced-Round AES by Ghaedi Bardeh, Navid, Rijmen, Vincent

    Published in IACR Transactions on Symmetric Cryptology (10-06-2022)
    “…A new fundamental 4-round property of AES, called the zero-difference property, was introduced by Rønjom, Bardeh and Helleseth at Asiacrypt 2017. Our work…”
    Get full text
    Journal Article
  7. 7

    A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis by Azimi, Seyyed Arash, Ranea, Adrián, Salmasizadeh, Mahmoud, Mohajeri, Javad, Aref, Mohammad Reza, Rijmen, Vincent

    Published in Designs, codes, and cryptography (2022)
    “…ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR. To evaluate the resistance of an ARX cipher against…”
    Get full text
    Journal Article
  8. 8

    Multidimensional Linear Cryptanalysis of Feistel Ciphers by Aşkın Özdemir, Betül, Beyne, Tim, Rijmen, Vincent

    Published in IACR Transactions on Symmetric Cryptology (08-12-2023)
    “…This paper presents new generic attacks on Feistel ciphers that incorporate the key addition at the input of the non-invertible round function only. This…”
    Get full text
    Journal Article
  9. 9

    The Rebound Attack and Subspace Distinguishers: Application to Whirlpool by Lamberger, Mario, Mendel, Florian, Schläffer, Martin, Rechberger, Christian, Rijmen, Vincent

    Published in Journal of cryptology (01-04-2015)
    “…We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by…”
    Get full text
    Journal Article
  10. 10

    The phantom of differential characteristics by Liu, Yunwen, Zhang, Wenying, Sun, Bing, Rijmen, Vincent, Liu, Guoqiang, Li, Chao, Fu, Shaojing, Cao, Meichun

    Published in Designs, codes, and cryptography (01-11-2020)
    “…For differential cryptanalysis under the single-key model, the key schedules hardly need to be exploited in constructing the characteristics, which is based on…”
    Get full text
    Journal Article
  11. 11

    Rhythmic Keccak: SCA Security and Low Latency in HW by Victor Arribas, Begül Bilgin, George Petrides, Svetla Nikova, Vincent Rijmen

    “…Glitches entail a great issue when securing a cryptographic implementation in hardware. Several masking schemes have been proposed in the literature that…”
    Get full text
    Journal Article
  12. 12

    Probability distributions of correlation and differentials in block ciphers by Daemen Joan, Rijmen Vincent

    Published in Journal of mathematical cryptology (01-08-2007)
    “…We study the probability distributions of difference propagation probabilities and input-output correlations for functions and block ciphers of given…”
    Get full text
    Journal Article
  13. 13

    Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs by Li, Wei, Rijmen, Vincent, Tao, Zhi, Wang, Qingju, Chen, Hua, Liu, Yunwen, Li, Chaoyun, Liu, Ya

    Published in Science China. Information sciences (01-03-2018)
    “…With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing…”
    Get full text
    Journal Article
  14. 14

    Whirlwind: a new cryptographic hash function by Barreto, Paulo, Nikov, Ventzislav, Nikova, Svetla, Rijmen, Vincent, Tischhauser, Elmar

    Published in Designs, codes, and cryptography (01-08-2010)
    “…A new cryptographic hash function Whirlwind is presented. We give the full specification and explain the design rationale. We show how the hash function can be…”
    Get full text
    Journal Article
  15. 15

    Editorial by Rijmen, Vincent

    Published in Journal of cryptology (01-07-2021)
    Get full text
    Journal Article
  16. 16

    Editorial by Rijmen Vincent

    Published in Journal of cryptology (01-01-2021)
    Get full text
    Journal Article
  17. 17

    Editorial by Rijmen, Vincent

    Published in Journal of cryptology (01-01-2021)
    Get full text
    Journal Article
  18. 18
  19. 19

    Linear hulls with correlation zero and linear cryptanalysis of block ciphers by Bogdanov, Andrey, Rijmen, Vincent

    Published in Designs, codes, and cryptography (01-03-2014)
    “…Linear cryptanalysis, along with differential cryptanalysis, is an important tool to evaluate the security of block ciphers. This work introduces a novel…”
    Get full text
    Journal Article
  20. 20

    Editorial by Rijmen, Vincent

    Published in Journal of cryptology (01-01-2021)
    Get full text
    Journal Article