The design of Rijndael J Daemen, V Rijmen Springer-verlag, 2002 | 7187 | 2002 |
AES proposal: Rijndael J Daemen, V Rijmen | 2761 | 1999 |
The block cipher Square J Daemen, L Knudsen, V Rijmen Fast Software Encryption: 4th International Workshop, FSE’97 Haifa, Israel …, 1997 | 1217 | 1997 |
Advanced encryption standard V Rijmen, J Daemen Proceedings of federal information processing standards publications …, 2001 | 970* | 2001 |
The block cipher Rijndael J Daemen, V Rijmen International Conference on Smart Card Research and Advanced Applications …, 1998 | 726 | 1998 |
On the indifferentiability of the sponge construction G Bertoni, J Daemen, M Peeters, G Van Assche Annual International Conference on the Theory and Applications of …, 2008 | 588 | 2008 |
Cipher and hash function design strategies based on linear and differential cryptanalysis J Daemen Doctoral Dissertation, March 1995, KU Leuven, 1995 | 550 | 1995 |
Sponge functions G Bertoni, J Daemen, M Peeters, G Van Assche ECRYPT hash workshop 2007 (9), 2007 | 548 | 2007 |
Duplexing the sponge: single-pass authenticated encryption and other applications G Bertoni, J Daemen, M Peeters, G Van Assche Selected Areas in Cryptography: 18th International Workshop, SAC 2011 …, 2012 | 482 | 2012 |
Keccak G Bertoni, J Daemen, M Peeters, G Van Assche Annual international conference on the theory and applications of …, 2013 | 400 | 2013 |
Keccak sponge function family main document G Bertoni, J Daemen, M Peeters, G Van Assche Submission to NIST (Round 2) 3 (30), 320-337, 2009 | 397 | 2009 |
Rijndael for AES. J Daemen, V Rijmen AES Candidate Conference, 343-348, 2000 | 378 | 2000 |
The cipher SHARK V Rijmen, J Daemen, B Preneel, A Bosselaers, E De Win Fast Software Encryption: Third International Workshop Cambridge, UK …, 1996 | 356 | 1996 |
The wide trail design strategy J Daemen, V Rijmen Cryptography and Coding: 8th IMA International Conference Cirencester, UK …, 2001 | 270 | 2001 |
The keccak sha-3 submission G Bertoni, J Daemen, M Peeters, G Van Assche Submission to NIST (Round 3) 6 (7), 16, 2011 | 265 | 2011 |
Weak keys for IDEA J Daemen, R Govaerts, J Vandewalle Advances in Cryptology—CRYPTO’93: 13th Annual International Cryptology …, 1994 | 191 | 1994 |
Correlation matrices J Daemen, V Rijmen, J Daemen, V Rijmen The Design of Rijndael: The Advanced Encryption Standard (AES), 91-113, 2020 | 183 | 2020 |
Cryptographic sponge functions G Bertoni, J Daemen, M Peeters, G Van Assche Submission to NIST (Round 3), 6, 2011 | 177 | 2011 |
Resistance against implementation attacks: A comparative study of the AES proposals J Daemen, V Rijmen Proceedings of the Second Advanced Encryption Standard (AES) Candidate …, 1999 | 169 | 1999 |
Probability distributions of correlation and differentials in block ciphers J Daemen, V Rijmen Journal of Mathematical Cryptology 1 (3), 221-242, 2007 | 164 | 2007 |