WorldCat Identities

Rijmen, Vincent 1970-

Overview
Works: 24 works in 121 publications in 2 languages and 3,234 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Other, Author
Publication Timeline
.
Most widely held works by Vincent Rijmen
Advanced encryption standard--AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papers by Hans Dobbertin( )

14 editions published in 2005 in English and held by 584 WorldCat member libraries worldwide

"This volume comprises the proceedings of the 4th Conference on Advanced Encryption Standard, 'AES - State of the Crypto Analysis', which was held in Bonn, Germany, during 10-12 May 2004."
Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings by David Hutchison( )

16 editions published in 2008 in English and Undetermined and held by 505 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography
Selected areas in cryptography : 16th international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 : revised selected papers by Michael Jacobson( )

12 editions published in 2009 in English and held by 472 WorldCat member libraries worldwide

This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures by Gerhard Goos( Book )

18 editions published in 1998 in English and German and held by 384 WorldCat member libraries worldwide

The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto, and Asiacrypt) shows that interest in the eld is increasing
Fast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papers by Joan Daemen( Book )

17 editions published between 2002 and 2004 in English and held by 364 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002. The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends
The design of Rijndael : AES--the Advanced Encryption Standard by Joan Daemen( Book )

15 editions published between 2001 and 2011 in English and held by 351 WorldCat member libraries worldwide

"This book is the story of the design of Rijndael [winner of the contest for the new Advanced Encryption Standard (AES) for the United States, organized by NIST in January 1997], as told by the designers themselves. It outlines the foundations of Rijndael in relation to the previous ciphers the authors have designed. It explains the mathematics needed to understand the operation of Rijndael, and it provides reference C code and test vectors for the cipher"--Page [v]
Advances in cryptology – EUROCRYPT 2018 : 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 - May 3, 2018 : proceedingsnPart 2 by EUROCRYPT (Conference)( )

10 editions published in 2018 in English and held by 341 WorldCat member libraries worldwide

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cryptography.
The design of Rijndael : AES - the advanced encryption standard ; with 17 tables by Joan Daemen( Book )

1 edition published in 2002 in English and held by 40 WorldCat member libraries worldwide

Information security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedings by Agnes Hui Chan( )

2 editions published in 2008 in English and held by 38 WorldCat member libraries worldwide

As distinct from other security and cryptography conferences, the Information Security Conference (ISC) 2002 brought together individuals involved in a wide variety of different disciplines of information security to foster the exchange of ideas. The conference is an outgrowth of the Information Security Workshop, first held in Ishikawa, Japan 1997. ISC 2002 was held in Sao Paulo, Brazil, on September 30- October 2, 2002. The Program Committee considered 81 submissions of which 38 papers were accepted for presentation. These proceedings contain revised versions of the accepted papers. The papers provide a representative sample of both the variety and the truly international scope of information security research conducted currently. The topics addressed range from e-commerce protocols to access control and trust management, and to cryptography and cryptographic algorithms. Many people deserve our gratitude for their contribution to the success of the conference. We would like to thank the General Chair, Routo Terada, for overseeing the local arrangements, including registration and maintaining the conference website, and for the smooth running of the conference. We are grateful to Robbie Ye for his expert help in processing the electronic submissions, reviews and acceptance notifications. Robbie's enthusiasm and energy greatly simplified the Program Committee's task of conducting the on-line evaluation of the submitted papers under tight time constraints
Symmetric cryptography 07021 abstracts collection ; Dagstuhl seminar( )

1 edition published in 2007 in English and held by 16 WorldCat member libraries worldwide

Seminar on symmetric cryptography Dagstuhl seminar 07021 ; 07.01.07-12.01.07 ; executive summary( )

1 edition published in 2007 in English and held by 16 WorldCat member libraries worldwide

Advanced encryption standard- AES 4th International Conference, AES 2004 : Bonn, Germany, May 10-12, 2004 : revised selected and invited papers by Hans Dobbertin( )

2 editions published in 2005 in English and held by 5 WorldCat member libraries worldwide

Development of identity-based authenticated key agreement protocols : doctor of philosophy thesis by Marko Hölbl( Book )

1 edition published in 2009 in English and held by 3 WorldCat member libraries worldwide

Key agreement protocols enable two or more entities to establish a shared session key which can be later used to achieve a cryptographic goal such as encryption of data sent over an insecure network. In addition, authenticated key agreement protocols assure authenticity of the participating entities. Different approaches can be used when developing authenticated key agreement protocols which affect their security and efficiency. Security of an authenticated key agreement protocol is defined using security attributes. Themain goal is to develop a protocol which is secure and efficient at the same time. This thesis discusses two-party and three-party identity-based authenticated key agreement protocols, their security and efficiency attributes and presents several contributions to the field. Firstly, two new two-party identity-based authenticated key agreement protocol using modular arithmetics are proposed, namely IDAK2-1 and IDAK2-2. Secondly, a key compromise impersonation attack on Scott's two-party identity-based authenticated key agreement protocol using pairings is described and two new two-party identity-based authenticated key agreement protocols which employ pairings are proposed - IDAK2P-1 and IDAK2P-2. Finally, two new three-party identity-based authenticated key agreement protocols which employ pairings areproposed, named IDAK3P-1 and IDAK3P-2. All proposed protocols are evaluatedregarding security and efficiency. The security comparison criterion is based upon the fulfillment of security attributes while the efficiency criterion is defined partly in scope of the thesis and partly from literature.It includes computational as well as communicational efficiency. Moreover, the proposed protocols are compared to existing ones with regard to efficiency and security. The security criterion is defined as the fulfillment of security attributes and the existence of attacks for a specific protocol. The efficiency comparison criterion is defined by the communicational and computation effort of each protocol. Additionally, a comprehensive in-depth review of existing two-party and three-party identity-based authenticated key agreement protocols, their properties and known attacks is given. The results of the thesis regarding two-party identity-based key agreement protocols using modular arithmetics indicate that IDAK2-1 and IDAK2-2 conform to all security attributes. IDAK2-2 is the most efficient protocol of the group equalto Saeednia et al's protocol, whereas IDAK2-1 is the second most efficient protocol of the group. Regarding two-party identity-based authenticated key agreement protocol employing pairing operations, both IDAK2P-1 and IDAK2P-2 offer all the security attributes, whereas several competitive protocols do not. IDAK2P-2 is among the most efficient protocols if pre-computations are taken into consideration, while IDAK2P-1 is more efficient than Choie-Jeong-Lee's protocol I. In the group of three-party identity-based authenticated key agreement protocols, the proposed IDAK3P-1 protocol conforms to all security attributes, whereas IDAK3P-2 lacks in perfect forward secrecy. However, specific competitive protocols share this deficiency. Regarding efficiency, IDAK3P-1 is the most efficient protocol, while IDAK3P-2 is the second most efficient and at the same level as Shim's protocol
Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings by David Hutchison( Book )

1 edition published in 2008 in English and held by 2 WorldCat member libraries worldwide

Information Security( Book )

1 edition published in 2008 in Undetermined and held by 2 WorldCat member libraries worldwide

The design of Rijndael : the wide trail strategy explained by Joan Daemen( Book )

1 edition published in 2001 in English and held by 2 WorldCat member libraries worldwide

State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997( )

1 edition published in 1998 in English and held by 1 WorldCat member library worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.60 (from 0.52 for Selected a ... to 0.91 for The design ...)

Advanced encryption standard--AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 : revised selected and invited papers Advanced encryption standard- AES 4th International Conference, AES 2004 : Bonn, Germany, May 10-12, 2004 : revised selected and invited papers
Covers
Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedingsSelected areas in cryptography : 16th international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 : revised selected papersState of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lecturesFast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papersThe design of Rijndael : AES--the Advanced Encryption StandardThe design of Rijndael : AES - the advanced encryption standard ; with 17 tablesInformation security : 5th International Conference, ISC 2002, Sao Paulo, Brazil, September 30-October 2, 2002 : proceedingsAdvanced encryption standard- AES 4th International Conference, AES 2004 : Bonn, Germany, May 10-12, 2004 : revised selected and invited papers
Alternative Names
Vincent Rijmen Belgian cryptographer

Vincent Rijmen Belgisch wiskundige

Vincent Rijmen Belgischer Kryptografieexperte

Vincent Rijmen crittografo belga

Vincent Rijmen cryptographe belge

Винсент Рэймен

וינסנט ריימן

וינסנט ריימן קריפטוגרף בלגי

وینسنت رییمن

วินเซ็นต์ ริจเมน

빈센트 리만

フィンセント・ライメン

文森·雷傑門

樊尚·里杰门

Languages
English (114)

German (1)