Gilles Van Assche

Results: 28



#Item
1

Differential propagation analysis of K Joan Daemen and Gilles Van Assche STMicroelectronics Abstract. In this paper we introduce new concepts that help read and understand low-weight differential trails in K

Add to Reading List

Source URL: keccak.team

Language: English - Date: 2017-08-22 12:54:44
    2Cryptography / Block ciphers / NOEKEON / Gilles Van Assche / Joan Daemen / BaseKing / Vincent Rijmen / Advanced Encryption Standard / Linear cryptanalysis / International Data Encryption Algorithm / Interpolation attack / Panama

    Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen The NOEKEON

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:16
    3Cryptography / Cryptographic hash functions / NIST hash function competition / Hashing / SHA-3 / Sponge function / Gilles Van Assche / Joan Daemen / Hash-based message authentication code / Data Encryption Standard / Hash function / Random oracle

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    4Cryptography / NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Joan Daemen / Gilles Van Assche / Differential cryptanalysis / Data Encryption Standard

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    5Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

    Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2013-09-19 10:37:36
    6NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

    Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    7NIST hash function competition / SHA-3 / Cryptographic hash functions / Hashing / Cryptography / Sponge function / Gilles Van Assche / Joan Daemen / Hash function

    Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    8NIST hash function competition / SHA-3 / Cryptographic hash functions / Hashing / Sponge function / Cryptography / Gilles Van Assche

    Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

    Add to Reading List

    Source URL: keccak.noekeon.org

    Language: English - Date: 2013-02-27 15:26:40
    9

    Joan Daemen, Michaël Peeters, Gilles Van Assche, Vincent Rijmen The NOEKEON

    Add to Reading List

    Source URL: gva.noekeon.org

    Language: English - Date: 2013-02-27 15:26:38
      10

      ISIT 2002, Lausanne, Switzerland, June 30 – July 5, 2002 Joint Entropy-Constrained Multiterminal Quantization Jean Cardinal Gilles Van Assche

      Add to Reading List

      Source URL: gva.noekeon.org

      Language: English - Date: 2013-02-27 15:26:38
        UPDATE