| 2009 | ||
|---|---|---|
| 77 | Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers Springer 2009 | |
| 76 | Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer: Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ASIACRYPT 2009: 126-143 | |
| 75 | Clemens Heuberger, Vincent Rijmen: Editorial. Computing 85(1-2): 1-2 (2009) | |
| 74 | Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren: Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Computing 85(1-2): 85-104 (2009) | |
| 73 | Joan Daemen, Vincent Rijmen: New criteria for linear maps in AES-like ciphers. Cryptography and Communications 1(1): 47-69 (2009) | |
| 72 | Justin Troutman, Vincent Rijmen: Green Cryptography: Cleaner Engineering through Recycling. IEEE Security & Privacy 7(4): 71-73 (2009) | |
| 71 | Justin Troutman, Vincent Rijmen: Green Cryptography: Cleaner Engineering through Recycling, Part 2. IEEE Security & Privacy 7(5): 64-65 (2009) | |
| 2008 | ||
| 70 | Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Springer 2008 | |
| 69 | Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings Springer 2008 | |
| 68 | Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar: Correlated Keystreams in Moustique. AFRICACRYPT 2008: 246-257 | |
| 67 | Svetla Nikova, Vincent Rijmen, Martin Schläffer: Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. ICISC 2008: 218-234 | |
| 66 | Svetla Nikova, Vincent Rijmen, Martin Schläffer: Using Normal Bases for Compact Hardware Implementations of the AES S-Box. SCN 2008: 236-245 | |
| 65 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of the Hash Function Design Strategy Called SMASH. IEEE Transactions on Information Theory 54(8): 3647-3655 (2008) | |
| 64 | Vincent Rijmen, Paulo S. L. M. Barreto, Décio L. Gazzoni Filho: Rotation symmetry in algebraically generated cryptographic substitution tables. Inf. Process. Lett. 106(6): 246-250 (2008) | |
| 63 | Christian Rechberger, Vincent Rijmen: New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. J. UCS 14(3): 347-376 (2008) | |
| 2007 | ||
| 62 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: Symmetric Cryptography, 07.01. - 12.01.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 | |
| 61 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen: Second Preimages for Iterated Hash Functions and Their Implications on MACs. ACISP 2007: 68-81 | |
| 60 | Lars R. Knudsen, Vincent Rijmen: Known-Key Distinguishers for Some Block Ciphers. ASIACRYPT 2007: 315-324 | |
| 59 | Florian Mendel, Vincent Rijmen: Cryptanalysis of the Tiger Hash Function. ASIACRYPT 2007: 536-550 | |
| 58 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Second Preimages for SMASH. CT-RSA 2007: 101-111 | |
| 57 | Christian Rechberger, Vincent Rijmen: On Authentication with HMAC and Non-random Properties. Financial Cryptography 2007: 119-133 | |
| 56 | Florian Mendel, Vincent Rijmen: Colliding Message Pair for 53-Step HAS-160. ICISC 2007: 324-334 | |
| 55 | Florian Mendel, Vincent Rijmen: Weaknesses in the HAS-V Compression Function. ICISC 2007: 335-345 | |
| 54 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Abstracts Collection -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
| 53 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen: 07021 Executive Summary -- Symmetric Cryptography. Symmetric Cryptography 2007 | |
| 2006 | ||
| 52 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: A compact FPGA implementation of the hash function whirlpool. FPGA 2006: 159-166 | |
| 51 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of Step-Reduced SHA-256. FSE 2006: 126-143 | |
| 50 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: The Impact of Carries on the Complexity of Collision Attacks on SHA-1. FSE 2006: 278-292 | |
| 49 | Svetla Nikova, Christian Rechberger, Vincent Rijmen: Threshold Implementations Against Side-Channel Attacks and Glitches. ICICS 2006: 529-545 | |
| 48 | Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe: Update on Tiger. INDOCRYPT 2006: 63-79 | |
| 47 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: On the Collision Resistance of RIPEMD-160. ISC 2006: 101-116 | |
| 46 | Joan Daemen, Vincent Rijmen: Understanding Two-Round Differentials in AES. SCN 2006: 78-94 | |
| 45 | Christian Rechberger, Vincent Rijmen, Nicolas Sklavos: The NIST Cryptographic Workshop on Hash Functions. IEEE Security & Privacy 4(1): 54-56 (2006) | |
| 2005 | ||
| 44 | Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers Springer 2005 | |
| 43 | Vincent Rijmen, Elisabeth Oswald: Update on SHA-1. CT-RSA 2005: 58-71 | |
| 42 | Joan Daemen, Vincent Rijmen: A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. FSE 2005: 1-17 | |
| 41 | Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen: A Side-Channel Analysis Resistant Description of the AES S-Box. FSE 2005: 413-423 | |
| 40 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Exploiting Coding Theory for Collision Attacks on SHA-1. IMA Int. Conf. 2005: 78-95 | |
| 39 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Breaking a New Hash Function Design Strategy Called SMASH. Selected Areas in Cryptography 2005: 233-244 | |
| 38 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Impact of Rotations in SHA-1 and Related Hash Functions. Selected Areas in Cryptography 2005: 261-275 | |
| 37 | Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen: Analysis of simplified variants of SHA-256. WEWoRC 2005: 123-134 | |
| 36 | Joan Daemen, Vincent Rijmen: Rijndael/AES. Encyclopedia of Cryptography and Security 2005 | |
| 2004 | ||
| 35 | Vincent Rijmen, Elisabeth Oswald: Representations and Rijndael Descriptions. AES Conference 2004: 148-158 | |
| 34 | Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen: Periodic Properties of Counter Assisted Stream Ciphers. CT-RSA 2004: 39-53 | |
| 33 | Malek Bechlaghem, Vincent Rijmen: Proving Key Usage. WISA 2004: 65-72 | |
| 2003 | ||
| 32 | Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle: The MESH Block Ciphers. WISA 2003: 458-473 | |
| 2002 | ||
| 31 | Joan Daemen, Vincent Rijmen: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers Springer 2002 | |
| 30 | Joan Daemen, Vincent Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard Springer 2002 | |
| 29 | Joan Daemen, Vincent Rijmen: AES and the Wide Trail Design Strategy. EUROCRYPT 2002: 108-109 | |
| 28 | Joan Daemen, Vincent Rijmen: Security of a Wide Trail Design. INDOCRYPT 2002: 1-11 | |
| 2001 | ||
| 27 | Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim: Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. FSE 2001: 165-173 | |
| 26 | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen: Differential Cryptanalysis of Q. FSE 2001: 174-186 | |
| 25 | Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle: Producing Collisions for PANAMA. FSE 2001: 37-51 | |
| 24 | Paulo S. L. M. Barreto, Hae Yong Kim, Vincent Rijmen: Toward a secure public-key blockwise fragile authentication watermarking. ICIP (2) 2001: 494-497 | |
| 23 | Joan Daemen, Vincent Rijmen: The Wide Trail Design Strategy. IMA Int. Conf. 2001: 222-238 | |
| 22 | Johan Borst, Bart Preneel, Vincent Rijmen: Cryptography on smart cards. Computer Networks 36(4): 423-435 (2001) | |
| 21 | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: Linear Frameworks for Block Ciphers. Des. Codes Cryptography 22(1): 65-87 (2001) | |
| 2000 | ||
| 20 | Joan Daemen, Vincent Rijmen: Rijndael for AES. AES Candidate Conference 2000: 343-348 | |
| 1999 | ||
| 19 | Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincent Rijmen: Equivalent Keys of HPC. ASIACRYPT 1999: 29-42 | |
| 18 | Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel: Attack on Six Rounds of Crypton. FSE 1999: 46-59 | |
| 17 | Lars R. Knudsen, Vincent Rijmen: On the Decorrelated Fast Cipher (DFC) and Its Theory. FSE 1999: 81-94 | |
| 1998 | ||
| 16 | Bart Preneel, Vincent Rijmen: State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997. Revised Lectures Springer 1998 | |
| 15 | Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege: Analysis Methods for (Alleged) RC4. ASIACRYPT 1998: 327-341 | |
| 14 | Joan Daemen, Vincent Rijmen: The Block Cipher BKSQ. CARDIS 1998: 236-245 | |
| 13 | Joan Daemen, Vincent Rijmen: The Block Cipher Rijndael. CARDIS 1998: 277-284 | |
| 12 | Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw: On the Design and Security of RC2. FSE 1998: 206-221 | |
| 11 | Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen: Differential Cryptanalysis of the ICE Encryption Algorithm. FSE 1998: 270-283 | |
| 10 | Chris Hall, John Kelsey, Vincent Rijmen, Bruce Schneier, David Wagner: Cryptanalysis of SPEED. Selected Areas in Cryptography 1998: 319-338 | |
| 1997 | ||
| 9 | Johan Borst, Lars R. Knudsen, Vincent Rijmen: Two Attacks on Reduced IDEA. EUROCRYPT 1997: 1-13 | |
| 8 | Vincent Rijmen, Bart Preneel: A Family of Trapdoor Ciphers. FSE 1997: 139-148 | |
| 7 | Joan Daemen, Lars R. Knudsen, Vincent Rijmen: The Block Cipher Square. FSE 1997: 149-165 | |
| 6 | Bart Preneel, Vincent Rijmen, Antoon Bosselaers: Recent Developments in the Design of Conventional Cryptographic Algorithms. State of the Art in Applied Cryptography 1997: 105-130 | |
| 5 | Vincent Rijmen, Bart Preneel, Erik De Win: On Weaknesses of Non-surjective Round Functions. Des. Codes Cryptography 12(3): 253-266 (1997) | |
| 1996 | ||
| 4 | Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win: The Cipher SHARK. FSE 1996: 99-111 | |
| 1994 | ||
| 3 | Vincent Rijmen, Bart Preneel: Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. FSE 1994: 242-248 | |
| 2 | Vincent Rijmen, Bart Preneel: Cryptanalysis of McGuffin. FSE 1994: 353-358 | |
| 1993 | ||
| 1 | Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens: Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds. CRYPTO 1993: 212-223 | |