What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Joan Daemen
Google Scholar
53
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
Shaking up authenticated encryption.
Joan Daemen
Seth Hoffert
Silvia Mella
Gilles Van Assche
Ronny Van Keer
2025
conf/eurosp
Statistical Evaluation of Entropy Accumulation in Linux.
Alexandre Bouez
Joan Daemen
Bart Mennink
2024
conf/sacrypt
Koala: A Low-Latency Pseudorandom Function.
Parisa Amiri-Eliasi
Yanis Belkheyar
Joan Daemen
Santosh Ghosh
Daniël Kuijsters
Alireza Mehrdad
Silvia Mella
Shahram Rasoolzadeh
Gilles Van Assche
2023
journals/tches
BipBip: A Low-Latency Tweakable Block Cipher with Small Dimensions.
Yanis Belkheyar
Joan Daemen
Christoph Dobraunig
Santosh Ghosh
Shahram Rasoolzadeh
2023
journals/tosc
Tighter Trail Bounds for Xoodoo.
Silvia Mella
Joan Daemen
Gilles Van Assche
2023
journals/tosc
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication.
Koustabh Ghosh
Parisa Amiri-Eliasi
Joan Daemen
2023
conf/latincrypt
ACE-HoT: Accelerating an Extreme Amount of Symmetric Cipher Evaluations for (High-order) Avalanche Tests.
Emanuele Bellini
Juan Grados
Mohamed Rachidi
Nitin Satpute
Joan Daemen
Solane El Hirch
2023
conf/crypto
On the Security of Keyed Hashing Based on Public Permutations.
Jonathan Fuchs
Yann Rotella
Joan Daemen
2023
conf/crypto
Twin Column Parity Mixers and Gaston - A New Mixing Layer and Permutation.
Solane El Hirch
Joan Daemen
Raghvendra Rohit
Rusydi H. Makarim
2023
conf/africacrypt
Universal Hashing Based on Field Multiplication and (Near-)MDS Matrices.
Koustabh Ghosh
Jonathan Fuchs
Parisa Amiri-Eliasi
Joan Daemen
2022
journals/tosc
Improved Differential and Linear Trail Bounds for ASCON.
Solane El Hirch
Silvia Mella
Alireza Mehrdad
Joan Daemen
2022
journals/tosc
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi: Application to Subterranean.
Alireza Mehrdad
Silvia Mella
Lorenzo Grassi
Joan Daemen
2022
conf/asiacrypt
Jammin' on the Deck.
Norica Bacuieti
Joan Daemen
Seth Hoffert
Gilles Van Assche
Ronny Van Keer
2021
conf/crypto
Thinking Outside the Superbox.
Nicolas Bordes
Joan Daemen
Daniël Kuijsters
Gilles Van Assche
2020
journals/tches
Protecting against Statistical Ineffective Fault Attacks.
Joan Daemen
Christoph Dobraunig
Maria Eichlseder
Hannes Groß
Florian Mendel
Robert Primas
2020
journals/tosc
The Subterranean 2.0 Cipher Suite.
Joan Daemen
Pedro Maat Costa Massolino
Alireza Mehrdad
Yann Rotella
2020
journals/tosc
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
Aldo Gunsing
Joan Daemen
Bart Mennink
2020
journals/tosc
Xoodyak, a lightweight cryptographic scheme.
Joan Daemen
Seth Hoffert
Michaël Peeters
Gilles Van Assche
Ronny Van Keer
2020
conf/eurocrypt
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection.
Thierry Simon
Lejla Batina
Joan Daemen
Vincent Grosso
Pedro Maat Costa Massolino
Kostas Papagiannopoulos
Francesco Regazzoni
Niels Samwel
2020
conf/africacrypt
Online Template Attack on ECDSA: - Extracting Keys via the Other Side.
Niels Roelofs
Niels Samwel
Lejla Batina
Joan Daemen
2019
journals/tosc
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model.
Aldo Gunsing
Joan Daemen
Bart Mennink
2018
journals/tosc
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers.
Joan Daemen
Bart Mennink
Gilles Van Assche
2018
journals/tosc
The design of Xoodoo and Xoofff.
Joan Daemen
Seth Hoffert
Gilles Van Assche
Ronny Van Keer
2018
journals/tosc
Column Parity Mixers.
Ko Stoffelen
Joan Daemen
2018
conf/acns
KangarooTwelve: Fast Hashing Based on Keccak-p.
Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
Ronny Van Keer
Benoît Viguier
2018
conf/ctrsa
Breaking Ed25519 in WolfSSL.
Niels Samwel
Lejla Batina
Guido Bertoni
Joan Daemen
Ruggero Susella
2017
journals/tosc
New techniques for trail bounds and application to differential trails in Keccak.
Silvia Mella
Joan Daemen
Gilles Van Assche
2017
journals/tosc
Farfalle: parallel permutation-based cryptography.
Guido Bertoni
Joan Daemen
Seth Hoffert
Michaël Peeters
Gilles Van Assche
Ronny Van Keer
2017
conf/ches
Changing of the Guards: A Simple and Efficient Method for Achieving Uniformity in Threshold Sharing.
Joan Daemen
2017
conf/asiacrypt
Full-State Keyed Duplex with Built-In Multi-user Support.
Joan Daemen
Bart Mennink
Gilles Van Assche
2016
conf/ccs
On Non-uniformity in Threshold Sharings.
Joan Daemen
2015
conf/fse
Security of Keyed Sponge Constructions Using a Modular Proof Approach.
Elena Andreeva
Joan Daemen
Bart Mennink
Gilles Van Assche
2014
conf/acns
Sakura: A Flexible Coding for Tree Hashing.
Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
2013
conf/eurocrypt
Keccak.
Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
2012
conf/fse
Differential Propagation Analysis of Keccak.
Joan Daemen
Gilles Van Assche
2011
conf/sacrypt
Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications.
Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
2010
conf/ches
Sponge-Based Pseudo-Random Number Generators.
Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
2008
conf/eurocrypt
On the Indifferentiability of the Sponge Construction.
Guido Bertoni
Joan Daemen
Michaël Peeters
Gilles Van Assche
2007
conf/fse
Producing Collisions for Panama, Instantaneously.
Joan Daemen
Gilles Van Assche
2005
conf/fse
A New MAC Construction ALRED and a Specific Instance ALPHA-MAC.
Joan Daemen
Vincent Rijmen
2002
conf/eurocrypt
AES and the Wide Trail Design Strategy.
Joan Daemen
Vincent Rijmen
2000
conf/fse
Bitslice Ciphers and Power Analysis Attacks.
Joan Daemen
Michaël Peeters
Gilles Van Assche
1998
conf/fse
Fast Hashing and Stream Encryption with PANAMA.
Joan Daemen
Craig S. K. Clapp
1997
conf/fse
The Block Cipher Square.
Joan Daemen
Lars R. Knudsen
Vincent Rijmen
1996
conf/fse
The Cipher SHARK.
Vincent Rijmen
Joan Daemen
Bart Preneel
Antoon Bosselaers
Erik De Win
1994
conf/fse
Correlation Matrices.
Joan Daemen
René Govaerts
Joos Vandewalle
1993
conf/fse
A New Approach to Block Cipher Design.
Joan Daemen
René Govaerts
Joos Vandewalle
1993
conf/crypto
Weak Keys for IDEA.
Joan Daemen
René Govaerts
Joos Vandewalle
1993
conf/eurocrypt
Resynchronization Weaknesses in Synchronous Stream Ciphers.
Joan Daemen
René Govaerts
Joos Vandewalle
1992
conf/esorics
A Hardware Design Model for Cryptographic Algorithms.
Joan Daemen
René Govaerts
Joos Vandewalle
1991
conf/asiacrypt
Limitations of the Even-Mansour Construction.
Joan Daemen
1991
conf/asiacrypt
A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton.
Joan Daemen
René Govaerts
Joos Vandewalle
1991
conf/asiacrypt
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91.
Joan Daemen
Antoon Bosselaers
René Govaerts
Joos Vandewalle
Coauthors
Aldo Gunsing
(2)
Alexandre Bouez
(1)
Alireza Mehrdad
(4)
Antoon Bosselaers
(2)
Bart Mennink
(6)
Bart Preneel
(1)
Benoît Viguier
(1)
Christoph Dobraunig
(2)
Craig S. K. Clapp
(1)
Daniël Kuijsters
(2)
Elena Andreeva
(1)
Emanuele Bellini
(1)
Erik De Win
(1)
Florian Mendel
(1)
Francesco Regazzoni
(1)
Gilles Van Assche
(21)
Guido Bertoni
(8)
Hannes Groß
(1)
Joan Daemen
(53)
Jonathan Fuchs
(2)
Joos Vandewalle
(7)
Juan Grados
(1)
Ko Stoffelen
(1)
Kostas Papagiannopoulos
(1)
Koustabh Ghosh
(2)
Lars R. Knudsen
(1)
Lejla Batina
(3)
Lorenzo Grassi
(1)
Maria Eichlseder
(1)
Michaël Peeters
(9)
Mohamed Rachidi
(1)
Nicolas Bordes
(1)
Niels Roelofs
(1)
Niels Samwel
(3)
Nitin Satpute
(1)
Norica Bacuieti
(1)
Parisa Amiri-Eliasi
(3)
Pedro Maat Costa Massolino
(2)
Raghvendra Rohit
(1)
René Govaerts
(7)
Robert Primas
(1)
Ronny Van Keer
(6)
Ruggero Susella
(1)
Rusydi H. Makarim
(1)
Santosh Ghosh
(2)
Seth Hoffert
(5)
Shahram Rasoolzadeh
(2)
Silvia Mella
(6)
Solane El Hirch
(3)
Thierry Simon
(1)
Vincent Grosso
(1)
Vincent Rijmen
(4)
Yanis Belkheyar
(2)
Yann Rotella
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to