The design of Xoodoo and Xoofff
Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Get full text
Journal Article
Tighter Trail Bounds for Xoodoo
Mella, Silvia, Daemen, Joan, Van Assche, Gilles
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Published in IACR Transactions on Symmetric Cryptology (08.12.2023)
Get full text
Journal Article
The subterranean 2.0 cipher suite
Daemen, Joan, Massolino, Pedro Maat Costa, Mehrdad, Alireza, Rotella, Yann
Published in IACR Transactions on Symmetric Cryptology (01.01.2020)
Published in IACR Transactions on Symmetric Cryptology (01.01.2020)
Get full text
Journal Article
Xoodyak, a lightweight cryptographic scheme
Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Published in IACR Transactions on Symmetric Cryptology (22.06.2020)
Get full text
Journal Article
Multimixer-128: Universal Keyed Hashing Based on Integer Multiplication
Ghosh, Koustabh, Amiri Eliasi, Parisa, Daemen, Joan
Published in IACR Transactions on Symmetric Cryptology (19.09.2023)
Published in IACR Transactions on Symmetric Cryptology (19.09.2023)
Get full text
Journal Article
Improved Differential and Linear Trail Bounds for ASCON
El Hirch, Solane, Mella, Silvia, Mehrdad, Alireza, Daemen, Joan
Published in IACR Transactions on Symmetric Cryptology (07.12.2022)
Published in IACR Transactions on Symmetric Cryptology (07.12.2022)
Get full text
Journal Article
Farfalle: parallel permutation-based cryptography
Guido Bertoni, Joan Daemen, Seth Hoffert, Michaël Peeters, Gilles Van Assche, Ronny Van Keer
Published in IACR Transactions on Symmetric Cryptology (01.12.2017)
Published in IACR Transactions on Symmetric Cryptology (01.12.2017)
Get full text
Journal Article
New techniques for trail bounds and application to differential trails in Keccak
Silvia Mella, Joan Daemen, Gilles Van Assche
Published in IACR Transactions on Symmetric Cryptology (01.03.2017)
Published in IACR Transactions on Symmetric Cryptology (01.03.2017)
Get full text
Journal Article
Errata to Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Aldo Gunsing, Joan Daemen, Bart Mennink
Published in IACR Transactions on Symmetric Cryptology (01.01.2020)
Published in IACR Transactions on Symmetric Cryptology (01.01.2020)
Get full text
Journal Article
Deck-Based Wide Block Cipher Modes and an Exposition of the Blinded Keyed Hashing Model
Aldo Gunsing, Joan Daemen, Bart Mennink
Published in IACR Transactions on Symmetric Cryptology (01.01.2019)
Published in IACR Transactions on Symmetric Cryptology (01.01.2019)
Get full text
Journal Article
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers
Joan Daemen, Bart Mennink, Gilles Van Assche
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Published in IACR Transactions on Symmetric Cryptology (01.01.2018)
Get full text
Journal Article
Sufficient conditions for sound tree and sequential hashing modes
Bertoni, Guido, Daemen, Joan, Peeters, Michaël, Van Assche, Gilles
Published in International journal of information security (01.08.2014)
Published in International journal of information security (01.08.2014)
Get full text
Journal Article
Algebraic properties of the maps \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\chi _n$$\end{document}χn
Get full text
Journal Article