Cryptographers' World
 

Vincent Rijmen


Author's Web Page Link

36 papers and 1 book in database with 1280 citations StarStar

Editor of 2 conference proceedings books

H-number: 17

Books

 
1. Joan DaemenVincent RijmenThe Design of Rijndael: AES - The Advanced Encryption Standard. Springer, 2002. ISBN 978-3-540-42580-9.

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

[Cited 37 times ]


Conference Proceedings

 
1. Dipanwita Roy ChowdhuryVincent Rijmen, editors, Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings. Springer, 2008. ISBN 978-3-540-89753-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Joan DaemenVincent Rijmen, editors, Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers. Springer, 2002. ISBN 3-540-44009-7.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Joan Daemen,  Lars R. Knudsen,  Vincent Rijmen,  Linear Frameworks for Block Ciphers, Designs, Codes and Cryptography, Volume 22(1), pp. 65 - 87, Springer, 2001.

[Electronic Edition][Cited 16 times ]

2. Vincent Rijmen,  Bart Preneel,  Erik De Win,  On Weaknesses of Non-surjective Round Functions, Designs, Codes and Cryptography, Volume 12(3), pp. 253 - 266, Springer, 1997.

[Electronic Edition][Cited 28 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Mario Lamberger,  Florian Mendel,  Christian Rechberger,  Vincent Rijmen,  Martin Schläffer,  Rebound Distinguishers: Results on the Full Whirlpool Compression Function, pp. 126 - 143, ASIACRYPT 2009.

[Electronic Edition][Cited 29 times ]

2. Emilia Käsper,  Vincent Rijmen,  Tor E. Bjørstad,  Christian Rechberger,  Matthew J. B. Robshaw,  Gautham Sekar,  Correlated Keystreams in Moustique, pp. 246 - 257, AFRICACRYPT 2008.

[Electronic Edition][Cited 1 times ]

3. Mario Lamberger,  Norbert Pramstaller,  Christian Rechberger,  Vincent Rijmen,  Second Preimages for SMASH, pp. 101 - 111, CT-RSA 2007.

[Electronic Edition][Cited 9 times ]

4. Christian Rechberger,  Vincent Rijmen,  On Authentication with HMAC and Non-random Properties, pp. 119 - 133, FC 2007.

[Electronic Edition][Cited 31 times ]

5. Florian Mendel,  Vincent Rijmen,  Cryptanalysis of the Tiger Hash Function, pp. 536 - 550, ASIACRYPT 2007.

[Electronic Edition][Cited 17 times ]

6. Lars R. Knudsen,  Vincent Rijmen,  Known-Key Distinguishers for Some Block Ciphers, pp. 315 - 324, ASIACRYPT 2007.

[Electronic Edition][Cited 30 times ]

7. Florian Mendel,  Bart Preneel,  Vincent Rijmen,  Hirotaka Yoshida,  Dai Watanabe,  Update on Tiger, pp. 63 - 79, INDOCRYPT 2006.

[Electronic Edition][Cited 13 times ]

8. Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  Vincent Rijmen,  The Impact of Carries on the Complexity of Collision Attacks on SHA-1, pp. 278 - 292, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

9. Florian Mendel,  Norbert Pramstaller,  Christian Rechberger,  Vincent Rijmen,  Analysis of Step-Reduced SHA-256, pp. 126 - 143, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 36 times ]

10. Norbert Pramstaller,  Christian Rechberger,  Vincent Rijmen,  Breaking a New Hash Function Design Strategy Called SMASH, pp. 233 - 244, SAC 2005.

[Electronic Edition][Cited 19 times ]

11. Norbert Pramstaller,  Christian Rechberger,  Vincent Rijmen,  Impact of Rotations in SHA-1 and Related Hash Functions, pp. 261 - 275, SAC 2005.

[Electronic Edition][Cited 1 times ]

12. Joan Daemen,  Vincent Rijmen,  A New MAC Construction ALRED and a Specific Instance ALPHA-MAC, pp. 1 - 17, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 34 times ]

13. Elisabeth Oswald,  Stefan Mangard,  Norbert Pramstaller,  Vincent Rijmen,  A Side-Channel Analysis Resistant Description of the AES S-Box, pp. 413 - 423, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 108 times Red StarRed Star]

14. Vincent Rijmen,  Elisabeth Oswald,  Update on SHA-1, pp. 58 - 71, CT-RSA 2005.

[Electronic Edition][Cited 78 times Red Star]

15. Ove Scavenius,  Martin Boesgaard,  Thomas Pedersen,  Jesper Christiansen,  Vincent Rijmen,  Periodic Properties of Counter Assisted Stream Ciphers, pp. 39 - 53, CT-RSA 2004.

[Electronic Edition][Cited 4 times ]

16. Joan Daemen,  Vincent Rijmen,  Security of a Wide Trail Design, pp. 1 - 11, INDOCRYPT 2002.

[Electronic Edition][Cited 5 times ]

17. Joan Daemen,  Vincent Rijmen,  AES and the Wide Trail Design Strategy, pp. 108 - 109, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 2 times ]

18. Paulo S. L. M. Barreto,  Vincent Rijmen,  Jorge Nakahara Jr.,  Bart Preneel,  Joos Vandewalle,  Hae Yong Kim,  Improved SQUARE Attacks against Reduced-Round HIEROCRYPT, pp. 165 - 173, FSE 2001.

[Electronic Edition][Cited 15 times ]

19. Vincent Rijmen,  Bart Van Rompay,  Bart Preneel,  Joos Vandewalle,  Producing Collisions for PANAMA, pp. 37 - 51, FSE 2001.

[Electronic Edition][Cited 19 times ]

20. Eli Biham,  Vladimir Furman,  Michal Misztal,  Vincent Rijmen,  Differential Cryptanalysis of Q, pp. 174 - 186, FSE 2001.

[Electronic Edition][Cited 2 times ]

21. Carl D'Halluin,  Gert Bijnens,  Bart Preneel,  Vincent Rijmen,  Equivalent Keys of HPC, pp. 29 - 42, ASIACRYPT 1999.

[Electronic Edition][Cited 5 times ]

22. Lars R. Knudsen,  Vincent Rijmen,  On the Decorrelated Fast Cipher (DFC) and Its Theory, pp. 81 - 94, FSE 1999.

[Electronic Edition][Cited 22 times ]

23. Carl D'Halluin,  Gert Bijnens,  Vincent Rijmen,  Bart Preneel,  Attack on Six Rounds of Crypton, pp. 46 - 59, FSE 1999.

[Electronic Edition][Cited 15 times ]

24. Lars R. Knudsen,  Willi Meier,  Bart Preneel,  Vincent Rijmen,  Sven Verdoolaege,  Analysis Methods for (Alleged) RC4, pp. 327 - 341, ASIACRYPT 1998.

[Electronic Edition][Cited 91 times Red Star]

25. Chris Hall,  John Kelsey,  Vincent Rijmen,  Bruce Schneier,  David Wagner,  Cryptanalysis of SPEED, pp. 319 - 338, SAC 1998.

[Electronic Edition][Cited 4 times ]

26. Bart Van Rompay,  Lars R. Knudsen,  Vincent Rijmen,  Differential Cryptanalysis of the ICE Encryption Algorithm, pp. 270 - 283, FSE 1998.

[Electronic Edition][Cited 14 times ]

27. Lars R. Knudsen,  Vincent Rijmen,  Ronald L. Rivest,  Matthew J. B. Robshaw,  On the Design and Security of RC2, pp. 206 - 221, FSE 1998.

[Electronic Edition][Cited 17 times ]

28. Johan Borst,  Lars R. Knudsen,  Vincent Rijmen,  Two Attacks on Reduced IDEA, pp. 1 - 13, EUROCRYPT 1997.

[Electronic Edition][Cited 41 times ]

29. Joan Daemen,  Lars R. Knudsen,  Vincent Rijmen,  The Block Cipher Square, pp. 149 - 165, FSE 1997.

[Electronic Edition][Cited 340 times Red StarRed StarRed Star]

30. Vincent Rijmen,  Bart Preneel,  A Family of Trapdoor Ciphers, pp. 139 - 148, FSE 1997.

[Electronic Edition][Cited 10 times ]

31. Vincent Rijmen,  Joan Daemen,  Bart Preneel,  Antoon Bosselaers,  Erik De Win,  The Cipher SHARK, pp. 99 - 111, FSE 1996.

[Electronic Edition][Cited 125 times Red StarRed Star]

32. Vincent Rijmen,  Bart Preneel,  Cryptanalysis of McGuffin, pp. 353 - 358, FSE 1994.

[Electronic Edition][Cited 6 times ]

33. Vincent Rijmen,  Bart Preneel,  Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers, pp. 242 - 248, FSE 1994.

[Electronic Edition][Cited 16 times ]

34. Bart Preneel,  Marnix Nuttin,  Vincent Rijmen,  Johan Buelens,  Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds, pp. 212 - 223, CRYPTO 1993.

[Electronic Edition][Cited 26 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...