Joan Daemen
Orcid: 0000-0002-4102-0775Affiliations:
- Digital Security Group, Radboud University Nijmegen, The Netherlands
According to our database1,
Joan Daemen
authored at least 114 papers
between 1985 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Propagation properties of a non-linear mapping based on squaring in odd characteristic.
Cryptogr. Commun., September, 2024
IACR Cryptol. ePrint Arch., 2024
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024
2023
Cryptogr. Commun., December, 2023
IACR Trans. Symmetric Cryptol., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
ACE-HoT: Accelerating an extreme amount of symmetric Cipher Evaluations for High-Order avalanche Tests.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and Cyclic Shift.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Hardware-oriented optimization of Bloom filter algorithms and architectures for ultra-high-speed lookups in network applications.
Microprocess. Microsystems, September, 2022
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean.
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
IACR Cryptol. ePrint Arch., 2022
Energy and side-channel security evaluation of near-threshold cryptographic circuits in 28nm FD-SOI technology.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022
2021
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021
Proceedings of the Embedded Computer Systems: Architectures, Modeling, and Simulation, 2021
2020
Information Security and Cryptography, Springer, ISBN: 978-3-662-60768-8, 2020
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
Novel Bloom filter algorithms and architectures for ultra-high-speed network security applications.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020
2019
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model.
IACR Trans. Symmetric Cryptol., 2019
2018
IACR Trans. Symmetric Cryptol., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Computing Frontiers Conference, 2017
2016
Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Exploring the use of shift register lookup tables for Keccak implementations on Xilinx FPGAs.
Proceedings of the 26th International Conference on Field Programmable Logic and Applications, 2016
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016
2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
IACR Cryptol. ePrint Arch., 2009
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers.
Computing, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
Proceedings of the Advances in Cryptology, 2008
2007
J. Math. Cryptol., 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
Information Security and Cryptography, Springer, ISBN: 978-3-642-07646-6, 2002
2001
Linear Frameworks for Block Ciphers.
Des. Codes Cryptogr., 2001
2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Rijndael for AES.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Proceedings of the 1st Workshop on Smartcard Technology, 1999
1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
Proceedings of the State of the Art in Applied Cryptography, 1997
1996
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
Proceedings of the Proceedings 1993 International Conference on Computer Design: VLSI in Computers & Processors, 1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Computer Security, 1992
1991
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton.
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1985
Proceedings of the Kommunikation in Verteilten Systemen II, 1985