Joan Daemen
Joan Daemen
Professor, Radboud University
Verified email at noekeon.org - Homepage
TitleCited byYear
The design of Rijndael: AES-the advanced encryption standard
J Daemen, V Rijmen
Springer Science & Business Media, 2013
49262013
AES proposal: Rijndael
J Daemen, V Rijmen
18991999
The block cipher Square
J Daemen, L Knudsen, V Rijmen
International Workshop on Fast Software Encryption, 149-165, 1997
9311997
The block cipher Rijndael
J Daemen, V Rijmen
International Conference on Smart Card Research and Advanced Applications …, 1998
4671998
Cipher and hash function design strategies based on linear and differential cryptanalysis
J Daemen
Doctoral Dissertation, March 1995, KU Leuven, 1995
391*1995
Rijndael, the advanced encryption standard
J Daemen, V Rijmen
Dr. Dobb's journal 26 (3), 137-139, 2001
3782001
On the indifferentiability of the sponge construction
G Bertoni, J Daemen, M Peeters, G Van Assche
Annual International Conference on the Theory and Applications of …, 2008
3542008
Sponge functions
G Bertoni, J Daemen, M Peeters, G Van Assche
ECRYPT hash workshop 2007 (9), 2007
3122007
The cipher SHARK
V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win
International Workshop on Fast Software Encryption, 99-111, 1996
2941996
Duplexing the sponge: single-pass authenticated encryption and other applications
G Bertoni, J Daemen, M Peeters, G Van Assche
International Workshop on Selected Areas in Cryptography, 320-337, 2011
2452011
The Rijndael block cipher
J Daemen
http://www. esat. kuleuven. ac. be/~ rijmen/rijndael/, 1998
2261998
Keccak sponge function family main document
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 2) 3 (30), 2009
1882009
The wide trail design strategy
J Daemen, V Rijmen
IMA International Conference on Cryptography and Coding, 222-238, 2001
1752001
The keccak reference
G Bertoni, J Daemen, M Peeters, GV Assche
Submission to NIST (Round 3) 13, 14-15, 2011
1742011
The Rijndael block cipher: AES proposal
J Daemen, V Rijmen
First Candidate Conference (AES1), 343-348, 1999
174*1999
Resistance Against Implementation Attacks. A Comparative Study of the AES Proposals
J Daemen
Second Advanced Encryption Standard Candidate Conference, 1999
1551999
The keccak sha-3 submission
G Bertoni, J Daemen, M Peeters, G Van Assche
Submission to NIST (Round 3) 6 (7), 16, 2011
1542011
Weak keys for IDEA
J Daemen, R Govaerts, J Vandewalle
Annual International Cryptology Conference, 224-231, 1993
1461993
Fast Hashing and Stream Encryption with Panama
J Daemen, C Clapp
International Workshop on Fast Software Encryption, 60-74, 1998
1221998
Rijndael
J Daemen, V Rijmen
Encyclopedia of Cryptography and Security, 1046-1049, 2011
1132011
The system can't perform the operation now. Try again later.
Articles 1–20