René Govaerts
According to our database1,
René Govaerts
authored at least 35 papers
between 1983 and 1997.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
1997
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
Proceedings of the Cryptography and Coding, 1997
Proceedings of the Financial Cryptography, 1997
Proceedings of the Advances in Cryptology, 1997
1996
A Restrictive Blind Signature Scheme with Applications to Electronic Cash.
Proceedings of the Communications and Multimedia Security II, 1996
1995
Proceedings of the Cryptography and Coding, 1995
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
Proceedings of the Fast Software Encryption, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the CCS '93, 1993
1992
Proceedings of the Computer Security, 1992
Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton.
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
Proceedings of the Computer Security and Industrial Cryptography, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1989
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.
Proceedings of the Advances in Cryptology, 1989
1988
1987
Proceedings of the Advances in Cryptology, 1987
1986
Additional Properties in the S-Boxes of the DES.
EUROCRYPT, 1986
1985
Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System.
Proceedings of the Advances in Cryptology, 1985
1984
IEEE Trans. Inf. Theory, 1984
Cryptography: How to Attack, What to Protect?
Proceedings of the IEEE International Conference on Communications: Links for the Future, 1984
1983
Analytical Characteristics of the DES.
Proceedings of the Advances in Cryptology, 1983