WorldCat Identities

Rijmen, Vincent 1970-

Overview
Works: 31 works in 139 publications in 2 languages and 3,508 library holdings
Genres: Conference papers and proceedings 
Roles: Editor, Other, Author
Publication Timeline
.
Most widely held works by Vincent Rijmen
Advanced encryption standard - AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 ; revised selected and invited papers by Hans Dobbertin( )

14 editions published in 2005 in English and held by 584 WorldCat member libraries worldwide

This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on cryptanalytic attacks and related topics, algebraic attacks and related results, hardware implementations, and other topics. All in all, the papers constitute a most up-to-date assessment of the state of the art of data encryption using the Advanced Encryption Standard AES, the de facto world standard for data encryption
Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedings by Dipanwita Roy Chowdhury( )

13 editions published in 2008 in English and Undetermined and held by 496 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography
Selected areas in cryptography : 16th international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 : revised selected papers by Michael J Jacobson( )

12 editions published in 2009 in English and held by 485 WorldCat member libraries worldwide

This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems
State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures by Course on Computer Security and Industrial Cryptography( Book )

19 editions published in 1998 in English and German and held by 393 WorldCat member libraries worldwide

This book is based on a course on the state of the art of computer security and industrial cryptography held at the Katholieke Universiteit Leuven, Belgium in June 1997. The 19 revised full presentations included in the book are developed from lectures given during the course. The areas covered range from theoretical prerequisites and recent technical developments to standardization issues and real-world applications. Among the topics addressed are cryptographic primitives, block ciphers, authentication, cryptographic algorithms, public-key crypto systems, key management, network security, Internet security protocols, key escrow, smart cart security, digital cash, systems security, security management, and IT security standardization
Fast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papers by Joan Daemen( )

18 editions published between 2002 and 2004 in English and held by 388 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002. The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends
The design of Rijndael : AES--the Advanced Encryption Standard by Joan Daemen( Book )

16 editions published between 2001 and 2011 in English and held by 363 WorldCat member libraries worldwide

"This book is the story of the design of Rijndael [winner of the contest for the new Advanced Encryption Standard (AES) for the United States, organized by NIST in January 1997], as told by the designers themselves. It outlines the foundations of Rijndael in relation to the previous ciphers the authors have designed. It explains the mathematics needed to understand the operation of Rijndael, and it provides reference C code and test vectors for the cipher"--Page [v]
Advances in cryptology - EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, proceedings by EUROCRYPT (Conference)( )

9 editions published in 2018 in English and held by 333 WorldCat member libraries worldwide

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cryptography.
The design of Rijndael : AES - the advanced encryption standard ; with 17 tables by Joan Daemen( Book )

1 edition published in 2002 in English and held by 40 WorldCat member libraries worldwide

Progress in Cryptology - INDOCRYPT 2008 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings by David Hutchison( )

2 editions published in 2008 in Undetermined and English and held by 23 WorldCat member libraries worldwide

Advanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers by Hans Dobbertin( )

4 editions published in 2005 in English and Undetermined and held by 17 WorldCat member libraries worldwide

Seminar on symmetric cryptography Dagstuhl seminar 07021 ; 07.01.07-12.01.07 ; executive summary( )

1 edition published in 2007 in English and held by 16 WorldCat member libraries worldwide

Symmetric cryptography 07021 abstracts collection ; Dagstuhl seminar( )

1 edition published in 2007 in English and held by 16 WorldCat member libraries worldwide

Information Security( )

1 edition published in 2008 in English and held by 6 WorldCat member libraries worldwide

Annotation
Information security : 11th international conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008 : proceedings by David Hutchison( Book )

3 editions published in 2008 in English and held by 6 WorldCat member libraries worldwide

"This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008." "The 33 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in topical sections on trusted computing, database and system security, intrusion detection, network security, cryptanalysis, digital signatures, AES, symmetric cryptography and hash functions, authentication as well as security protocols."--Jacket
Advances in Cryptology - EUROCRYPT 2018( )

3 editions published in 2018 in English and held by 5 WorldCat member libraries worldwide

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography
Development of identity-based authenticated key agreement protocols : doctor of philosophy thesis by Marko Hölbl( Book )

1 edition published in 2009 in English and held by 3 WorldCat member libraries worldwide

Protokoli za izmenjavo ključev omogočajo dvema ali več entitetam vzpostavitev skupnega sejnega ključa, ki se kasneje uporabi za zagotavljanje kriptografskega cilja, kot je šifriranje podatkov pri prenosu po nezavarovanih omrežjih. Overjeni protokoli za izmenjavo ključev dodatno zagotavljajo tudi overitev sodelujočih entitet. Pri razvoju overjenih protokolov za izmenjavo ključev lahko uporabimo različne pristope, ki vplivajo na varnost in učinkovitost. Varnost overjenih protokolov za izmenjavo ključev je definirana s pomočjo varnostnih kriterijev. Končni cilj je razvoj protokola, ki je varen in učinkovit hkrati. V disertaciji obravnavamo dvostranske in tristranske overjene protokole za izmenjavo ključev na temelju identitete, njihovo varnost in učinkovitost. V okviru disertacije so podani številni izvirni znanstveni prispevki. Predlagana sta dva nova dvostranska overjena protokola za izmenjavo ključev na temelju identitete z uporabo modularne aritmetike - IDAK2-1 in IDAK2-2. Nadalje je opisan napad s kompromitiranjem ključa na Scottov dvostranski overjeni protokol za izmenjavo ključev na temelju identitete z uporabo operacij parjenja in dva nova protokola omenjenega tipa; t.j. IDAK2P-1 in IDAK2P-2. Zadnji prispevek vključuje dva nova tristranska overjena protokola za izmenjavo ključev na temelju identitete z uporabo operacij parjenja, poimenovana IDAK3P-1 in IDAK3P-2. Vsi predlagani protokoli so evalvirani z vidika varnosti in učinkovitosti. Kriterij za ocenjevanje varnosti temelji na izpolnjevanju varnostnih kriterijev (lastnosti), medtem ko je kriterij za ocenjevanje učinkovitosti povzet po literaturi, kakor tudi definiran v okviru doktorske disertacije ter vključuje računsko in komunikacijsko učinkovitost. Predlagane in obstoječe protokole smo primerjali glede na učinkovitost in varnost. Kriterij za primerjavo učinkovitosti je definiran kot izpolnjevanje varnostnih kriterijev (lastnosti) in obstoj morebitnih napadov na določen protokol. Primerjavo učinkovitosti predlaganih in obstoječih protokolov smo izvedli s pomočjo komunikacijske in računske zahtevnosti. Izvirni znanstveni prispevki vključujejo tudi podrobno analizo obstoječih dvostranskih in tristranskih overjenih protokolov za izmenjavo ključev na temelju identitete, njihovih lastnosti in morebitnih napadov. Rezultati disertacije kažejo, da protokola IDAK2-1 in IDAK2-2 izpolnjujeta vse varnostne kriterije. Protokol IDAK2-2 je najbolj učinkovit protokol med dvostranskimi overjenimi protokoli za izmenjavo ključev na temelju identitete z uporabo modularne aritmetike in je enako učinkovit kot Saeednijev protokol, medtem ko se protokol IDAK2-1 uvršča na drugo mesto. Med dvostranskimi overjenimi protokoli za izmenjavo ključev na temelju identitete z uporabo operacij parjenja tako protokol IDAK2P-1 kakor IDAK2P-2 izpolnjujeta vse varnostne kriterije. Protokol IDAK2P-2 je med najbolj učinkovitimi protokoli ob upoštevanju pred-računanja. Protokol IDAK2P-1 pa je bolj učinkovit kot Choie-Jeong-Leejev protokol I. V skupini tristranskih overjenih protokolov za izmenjavo ključev na temelju identitete z uporabo operacij parjenja protokol IDAK3P-1 izpolnjuje vse varnostne kriterije, medtem ko protokol IDAK3P-2 ne izpolnjuje popolnega vnaprejšnjega skrivanja. Vendar tudi določeni obstoječi protokoli ne izpolnjujejo tega kriterija. Glede na učinkovitost je protokol IDAK3P-1 računsko najbolj učinkovit, protokol IDAK3P-2 pa je drugi najbolj učinkovit protokol in je izenačen s Shiminim protokolom
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.60 (from 0.48 for Informatio ... to 0.92 for Progress i ...)

Advanced encryption standard - AES : 4th international conference, AES 2004, Bonn, Germany, May 10-12, 2004 ; revised selected and invited papers Advanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers
Covers
Progress in cryptology : INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008 : proceedingsSelected areas in cryptography : 16th international workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 : revised selected papersState of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lecturesFast software encryption : 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002 : revised papersThe design of Rijndael : AES--the Advanced Encryption StandardThe design of Rijndael : AES - the advanced encryption standard ; with 17 tablesAdvanced Encryption Standard - AES 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited PapersInformation SecurityInformation security : 11th international conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008 : proceedings
Alternative Names
Vincent Rijmen Belgian cryptographer

Vincent Rijmen Belgisch wiskundige

Vincent Rijmen Belgischer Kryptografieexperte

Vincent Rijmen crittografo belga

Vincent Rijmen cryptographe belge

Винсент Рэймен

Вінсент Реймен

וינסנט ריימן

וינסנט ריימן קריפטוגרף בלגי

وینسنت رییمن

วินเซ็นต์ ริจเมน

빈센트 리만

フィンセント・ライメン

文森·雷傑門

樊尚·里杰门

Languages
English (117)

German (1)