DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Joan Daemen

Joan Daemen

  • The Design of Rijndael: AES - the Advanced Encryption Standard/Joan Daemen, Vincent Rijmen

    The Design of Rijndael: AES - the Advanced Encryption Standard/Joan Daemen, Vincent Rijmen

  • A Quantitative Study of Advanced Encryption Standard Performance

    A Quantitative Study of Advanced Encryption Standard Performance

  • SHA-3 and the Hash Function Keccak

    SHA-3 and the Hash Function Keccak

  • Advanced Encryption Standard AES Alternatives

    Advanced Encryption Standard AES Alternatives

  • Exploring NIST LWC/PQC Synergy with R5sneik How SNEIK 1.1 Algorithms Were Designed to Support Round5

    Exploring NIST LWC/PQC Synergy with R5sneik How SNEIK 1.1 Algorithms Were Designed to Support Round5

  • Advanced Encryption Standard AES Is a Block Cipher That Comes from The

    Advanced Encryption Standard AES Is a Block Cipher That Comes from The

  • The Making of Rijndael

    The Making of Rijndael

  • Crypto: Symmetric-Key Cryptography

    Crypto: Symmetric-Key Cryptography

  • Ascon V1.2. Submission to NIST

    Ascon V1.2. Submission to NIST

  • Innovations in Symmetric Cryptography

    Innovations in Symmetric Cryptography

  • The Block Cipher SQUARE

    The Block Cipher SQUARE

  • The Rijndael Block Cipher, Other Than Encryption

    The Rijndael Block Cipher, Other Than Encryption

  • Changing of the Guards

    Changing of the Guards

  • A High-Performance Threshold Implementation of a Baseking Variant on an ARM Architecture

    A High-Performance Threshold Implementation of a Baseking Variant on an ARM Architecture

  • Tightness of the Suffix Keyed Sponge Bound

    Tightness of the Suffix Keyed Sponge Bound

  • Introduction to Symmetric Cryptography

    Introduction to Symmetric Cryptography

  • Finding Integral Distinguishers with Ease

    Finding Integral Distinguishers with Ease

  • The SHA-3 FIPS

    The SHA-3 FIPS

Top View
  • Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis
  • SHA-3 Selection Announcement
  • Security Evaluation of SHA-3
  • Advanced Encryption Standard
  • ISAP V2.0. Submission to NIST
  • Two-Round AES Differentials*
  • Cryptography Outline Crypto That Is Not Covered
  • Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
  • Lightweight and Side-Channel Secure 44 S-Boxes from Cellular Automata
  • The Making of Keccak
  • The Design of Rijndael
  • Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
  • SHA-3 and the Hash Function Keccak
  • Bitslice Ciphers and Power Analysis Attacks
  • Nessie Proposal: NOEKEON
  • ISAP V2.0. Submission to NIST
  • Advanced Encryption Standard (AES) and It’S Working
  • Low-Latency Keccak at Any Arbitrary Order


© 2024 Docslib.org    Feedback