Joan Daemen

Results: 53



#Item
21

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:23
22The self-synchronizing stream cipher Mosquito: eSTREAM documentation, version 2 Joan Daemen, STMicroelectronics Belgium,  Paris Kitsos, Hellenic Open University, Patras, Greece,  8 Decembe

The self-synchronizing stream cipher Mosquito: eSTREAM documentation, version 2 Joan Daemen, STMicroelectronics Belgium, Paris Kitsos, Hellenic Open University, Patras, Greece, 8 Decembe

Add to Reading List

Source URL: www.ecrypt.eu.org

- Date: 2007-04-06 08:40:39
    23The self-synchronizing stream cipher Moustique Joan Daemen, STMicroelectronics Belgium,  Paris Kitsos, Hellenic Open University, Patras, Greece,  June 30, 2006 Abstract In this note we spe

    The self-synchronizing stream cipher Moustique Joan Daemen, STMicroelectronics Belgium, Paris Kitsos, Hellenic Open University, Patras, Greece, June 30, 2006 Abstract In this note we spe

    Add to Reading List

    Source URL: www.ecrypt.eu.org

    Language: English - Date: 2007-03-29 16:18:55
      24A Specification for The AES Algorithm  Rijndael (by Joan Daemen & Vincent Rijmen) A Specification for Rijndael, the AES Algorithm 1. Notation and Conventions

      A Specification for The AES Algorithm Rijndael (by Joan Daemen & Vincent Rijmen) A Specification for Rijndael, the AES Algorithm 1. Notation and Conventions

      Add to Reading List

      Source URL: techheap.packetizer.com

      Language: English - Date: 2003-05-12 00:06:19
      25Innovations in symmetric cryptography Joan Daemen STMicroelectronics, Belgium SSTIC, Rennes, June 5, 2013

      Innovations in symmetric cryptography Joan Daemen STMicroelectronics, Belgium SSTIC, Rennes, June 5, 2013

      Add to Reading List

      Source URL: www.sstic.org

      Language: English - Date: 2013-06-27 13:18:02
      26Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

      Keccak and SHA-3: code and standard updates Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics 2 NXP

      Add to Reading List

      Source URL: fosdem.org

      Language: English - Date: 2015-02-18 08:01:24
      27The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1  1 STMicroelectronics

      The Keccak Code Package Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 Ronny Van Keer1 1 STMicroelectronics

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2014-08-22 14:25:54
      28Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

      Comparison of seven SHA-3 candidates software implementations on smart cards. Mourad Gouicem∗ Oberthur Technologies Contact : {g.piret, e.prouff}@oberthur.com October 2010

      Add to Reading List

      Source URL: www-pequan.lip6.fr

      Language: English - Date: 2011-09-20 16:50:32
      29X-Sieve: CMU Sieve 2.2   From: Joan DAEMEN <joan.daemen@st.com> To: <hash-function@nist.gov>

      X-Sieve: CMU Sieve 2.2 From: Joan DAEMEN To:

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-06-20 09:10:52
      30The Second SHA-3 Candidate Conference Accepted Papers

      The Second SHA-3 Candidate Conference Accepted Papers

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2012-05-30 12:50:30