WorldCat Identities

Rijmen, Vincent 1970-

Overview
Works: 19 works in 95 publications in 2 languages and 2,574 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Other, Creator
Classifications: QA76.9.A25, 005.8
Publication Timeline
.
Most widely held works by Vincent Rijmen
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures by Course on Computer Security and Industrial Cryptography( Book )

13 editions published in 1998 in English and German and held by 288 WorldCat member libraries worldwide

This book is based on a course on the state of the art of computer security and industrial cryptography held at the Katholieke Universiteit Leuven, Belgium in June 1997. The 19 revised full presentations included in the book are developed from lectures given during the course. The areas covered range from theoretical prerequisites and recent technical developments to standardization issues and real-world applications. Among the topics addressed are cryptographic primitives, block ciphers, authentication, cryptographic algorithms, public-key crypto systems, key management, network security, Internet security protocols, key escrow, smart cart security, digital cash, systems security, security management, and IT security standardization
The design of Rijndael : AES--the Advanced Encryption Standard by Joan Daemen( Book )

13 editions published between 2001 and 2011 in English and held by 277 WorldCat member libraries worldwide

"This book is the story of the design of Rijndael [winner of the contest for the new Advanced Encryption Standard (AES) for the United States, organized by NIST in January 1997], as told by the designers themselves. It outlines the foundations of Rijndael in relation to the previous ciphers the authors have designed. It explains the mathematics needed to understand the operation of Rijndael, and it provides reference C code and test vectors for the cipher"--Page [v]
Fast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papers by Joan Daemen( Book )

11 editions published between 2002 and 2004 in English and held by 251 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002. The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends
Advanced encryption standard--AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papers by Hans Dobbertin( Book )

15 editions published in 2005 in English and held by 227 WorldCat member libraries worldwide

"This volume comprises the proceedings of the 4th Conference on Advanced Encryption Standard, 'AES - State of the Crypto Analysis', which was held in Bonn, Germany, during 10-12 May 2004."
Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings by David Hutchison( Book )

14 editions published in 2008 in English and held by 66 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography
Selected areas in cryptography : 16th international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 : revised selected papers by Michael J Jacobson( Book )

9 editions published in 2009 in English and held by 39 WorldCat member libraries worldwide

The design of Rijndael : AES - the advanced encryption standard ; with 17 tables by Joan Daemen( Book )

1 edition published in 2002 in English and held by 39 WorldCat member libraries worldwide

Selected Areas in Cryptography 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers by Michael J Jacobson( )

2 editions published in 2009 in English and held by 19 WorldCat member libraries worldwide

Information security : 11th international conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008 : proceedings by Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos David Hutchison( )

4 editions published in 2008 in English and held by 17 WorldCat member libraries worldwide

Annotation This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008.The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols
Seminar on symmetric cryptography Dagstuhl seminar 07021 ; 07.01.07-12.01.07 ; executive summary( )

2 editions published in 2007 in English and held by 16 WorldCat member libraries worldwide

Symmetric cryptography 07021 abstracts collection ; Dagstuhl seminar( )

2 editions published in 2007 in English and held by 16 WorldCat member libraries worldwide

Development of identity-based authenticated key agreement protocols : doctor of philosophy thesis by Marko Hölbl( Book )

1 edition published in 2009 in English and held by 3 WorldCat member libraries worldwide

Key agreement protocols enable two or more entities to establish a shared session key which can be later used to achieve a cryptographic goal such as encryption of data sent over an insecure network. In addition, authenticated key agreement protocols assure authenticity of the participating entities. Different approaches can be used when developing authenticated key agreement protocols which affect their security and efficiency. Security of an authenticated key agreement protocol is defined using security attributes. Themain goal is to develop a protocol which is secure and efficient at the same time. This thesis discusses two-party and three-party identity-based authenticated key agreement protocols, their security and efficiency attributes and presents several contributions to the field. Firstly, two new two-party identity-based authenticated key agreement protocol using modular arithmetics are proposed, namely IDAK2-1 and IDAK2-2. Secondly, a key compromise impersonation attack on Scott's two-party identity-based authenticated key agreement protocol using pairings is described and two new two-party identity-based authenticated key agreement protocols which employ pairings are proposed - IDAK2P-1 and IDAK2P-2. Finally, two new three-party identity-based authenticated key agreement protocols which employ pairings areproposed, named IDAK3P-1 and IDAK3P-2. All proposed protocols are evaluatedregarding security and efficiency. The security comparison criterion is based upon the fulfillment of security attributes while the efficiency criterion is defined partly in scope of the thesis and partly from literature.It includes computational as well as communicational efficiency. Moreover, the proposed protocols are compared to existing ones with regard to efficiency and security. The security criterion is defined as the fulfillment of security attributes and the existence of attacks for a specific protocol. The efficiency comparison criterion is defined by the communicational and computation effort of each protocol. Additionally, a comprehensive in-depth review of existing two-party and three-party identity-based authenticated key agreement protocols, their properties and known attacks is given. The results of the thesis regarding two-party identity-based key agreement protocols using modular arithmetics indicate that IDAK2-1 and IDAK2-2 conform to all security attributes. IDAK2-2 is the most efficient protocol of the group equalto Saeednia et al's protocol, whereas IDAK2-1 is the second most efficient protocol of the group. Regarding two-party identity-based authenticated key agreement protocol employing pairing operations, both IDAK2P-1 and IDAK2P-2 offer all the security attributes, whereas several competitive protocols do not. IDAK2P-2 is among the most efficient protocols if pre-computations are taken into consideration, while IDAK2P-1 is more efficient than Choie-Jeong-Lee's protocol I. In the group of three-party identity-based authenticated key agreement protocols, the proposed IDAK3P-1 protocol conforms to all security attributes, whereas IDAK3P-2 lacks in perfect forward secrecy. However, specific competitive protocols share this deficiency. Regarding efficiency, IDAK3P-1 is the most efficient protocol, while IDAK3P-2 is the second most efficient and at the same level as Shim's protocol
State of the art in applied cryptography : Course on Computer Security and industrial Cryptography : Leuven, Belgium, June 1997 : revised lectures by Course on Computer Security and Industrial Cryptography( Book )

1 edition published in 1998 in English and held by 3 WorldCat member libraries worldwide

The design of Rijndael : the wide trail strategy explained by Joan Daemen( Book )

1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide

Advanced encryption standard 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004, revised selected and invited papers by Hans Dobbertin( Book )

1 edition published in 2005 in English and held by 1 WorldCat member library worldwide

Advanced encryption standard- AES 4th International Conference, AES 2004 : Bonn, Germany, May 10-12, 2004 : revised selected and invited papers by Conference on Advanced Encryption Standard( )

1 edition published in 2005 in English and held by 1 WorldCat member library worldwide

State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997( )

1 edition published in 1998 in English and held by 1 WorldCat member library worldwide

Fast software encryption : 9th International Workshop, FSE 2002 : revised papers( Book )

2 editions published in 2002 in English and held by 1 WorldCat member library worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.64 (from 0.52 for Selected a ... to 1.00 for State of t ...)

Alternative Names
Vincent Rijmen Belgian cryptographer

Vincent Rijmen Belgisch wiskundige

Vincent Rijmen Belgischer Kryptografieexperte

Vincent Rijmen crittografo belga

Рэймен, Винсент

וינסנט ריימן

フィンセント・ライメン

Languages
English (94)

German (1)

Covers
The design of Rijndael : AES--the Advanced Encryption StandardFast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papersAdvanced encryption standard--AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papersProgress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedingsSelected areas in cryptography : 16th international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 : revised selected papersThe design of Rijndael : AES - the advanced encryption standard ; with 17 tablesInformation security : 11th international conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008 : proceedingsState of the art in applied cryptography : Course on Computer Security and industrial Cryptography : Leuven, Belgium, June 1997 : revised lectures