DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Joan Daemen
Joan Daemen
The Design of Rijndael: AES - the Advanced Encryption Standard/Joan Daemen, Vincent Rijmen
A Quantitative Study of Advanced Encryption Standard Performance
SHA-3 and the Hash Function Keccak
Advanced Encryption Standard AES Alternatives
Exploring NIST LWC/PQC Synergy with R5sneik How SNEIK 1.1 Algorithms Were Designed to Support Round5
Advanced Encryption Standard AES Is a Block Cipher That Comes from The
The Making of Rijndael
Crypto: Symmetric-Key Cryptography
Ascon V1.2. Submission to NIST
Innovations in Symmetric Cryptography
The Block Cipher SQUARE
The Rijndael Block Cipher, Other Than Encryption
Changing of the Guards
A High-Performance Threshold Implementation of a Baseking Variant on an ARM Architecture
Tightness of the Suffix Keyed Sponge Bound
Introduction to Symmetric Cryptography
Finding Integral Distinguishers with Ease
The SHA-3 FIPS
Top View
Cipher and Hash Function Design Strategies Based on Linear and Differential Cryptanalysis
SHA-3 Selection Announcement
Security Evaluation of SHA-3
Advanced Encryption Standard
ISAP V2.0. Submission to NIST
Two-Round AES Differentials*
Cryptography Outline Crypto That Is Not Covered
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Lightweight and Side-Channel Secure 44 S-Boxes from Cellular Automata
The Making of Keccak
The Design of Rijndael
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
SHA-3 and the Hash Function Keccak
Bitslice Ciphers and Power Analysis Attacks
Nessie Proposal: NOEKEON
ISAP V2.0. Submission to NIST
Advanced Encryption Standard (AES) and It’S Working
Low-Latency Keccak at Any Arbitrary Order
Rijndael Algorithm (Advanced Encryption Standard) AES
AES Public Comment from the Rijndael Team
Algebraic Cryptanalysis of Frit
Improving the Security and Efficiency of Block Ciphers Based on LS
IN2120 Information Security Cryptography Outline Terminology
Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Symmetric Cryptography
Hash Algorithm Requirements and Evaluation Criteria