Joan Daemen
Top View
- Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis
- SHA-3 Selection Announcement
- Security Evaluation of SHA-3
- Advanced Encryption Standard
- ISAP V2.0. Submission to NIST
- Two-Round AES Differentials*
- Cryptography Outline Crypto That Is Not Covered
- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
- Lightweight and Side-Channel Secure 44 S-Boxes from Cellular Automata
- The Making of Keccak
- The Design of Rijndael
- Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
- SHA-3 and the Hash Function Keccak
- Bitslice Ciphers and Power Analysis Attacks
- Nessie Proposal: NOEKEON
- ISAP V2.0. Submission to NIST
- Advanced Encryption Standard (AES) and It’S Working
- Low-Latency Keccak at Any Arbitrary Order